Page Menu
Home
GnuPG
Search
Configure Global Search
Log In
Files
F18825862
engine-gpg.c
No One
Temporary
Actions
Download File
Edit File
Delete File
View Transforms
Subscribe
Mute Notifications
Award Token
Size
95 KB
Subscribers
None
engine-gpg.c
View Options
/* engine-gpg.c - Gpg Engine.
* Copyright (C) 2000 Werner Koch (dd9jn)
* Copyright (C) 2001, 2002, 2003, 2004, 2005, 2006, 2007,
* 2009, 2010, 2012, 2013 g10 Code GmbH
*
* This file is part of GPGME.
*
* GPGME is free software; you can redistribute it and/or modify it
* under the terms of the GNU Lesser General Public License as
* published by the Free Software Foundation; either version 2.1 of
* the License, or (at your option) any later version.
*
* GPGME is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
* Lesser General Public License for more details.
*
* You should have received a copy of the GNU Lesser General Public
* License along with this program; if not, see <https://gnu.org/licenses/>.
* SPDX-License-Identifier: LGPL-2.1-or-later
*/
#if HAVE_CONFIG_H
#include
<config.h>
#endif
#include
<stdio.h>
#include
<stdlib.h>
#include
<string.h>
#include
<assert.h>
#ifdef HAVE_UNISTD_H
# include <unistd.h>
#endif
#ifdef HAVE_LOCALE_H
#include
<locale.h>
#endif
#include
"gpgme.h"
#include
"util.h"
#include
"ops.h"
#include
"wait.h"
#include
"context.h"
/*temp hack until we have GpmeData methods to do I/O */
#include
"priv-io.h"
#include
"sema.h"
#include
"debug.h"
#include
"data.h"
#include
"mbox-util.h"
#include
"engine-backend.h"
/* This type is used to build a list of gpg arguments and data
sources/sinks. */
struct
arg_and_data_s
{
struct
arg_and_data_s
*
next
;
gpgme_data_t
data
;
/* If this is not NULL, use arg below. */
int
inbound
;
/* True if this is used for reading from gpg. */
int
dup_to
;
int
print_fd
;
/* Print the fd number and not the special form of it. */
int
gpg_arg
;
/* True if this argument is not known by gpgtar. */
int
*
arg_locp
;
/* Write back the argv idx of this argument when
building command line to this location. */
char
arg
[
FLEXIBLE_ARRAY_MEMBER
];
/* Used if data above is not used. */
};
struct
fd_data_map_s
{
gpgme_data_t
data
;
int
inbound
;
/* true if this is used for reading from gpg */
int
dup_to
;
int
fd
;
/* the fd to use */
int
peer_fd
;
/* the other side of the pipe */
int
arg_loc
;
/* The index into the argv for translation purposes. */
void
*
tag
;
};
/* NB.: R_LINE is allocated an gpgrt function and thus gpgrt_free
* shall be used to release it. This takes care of custom memory
* allocators and avoids problems on Windows with different runtimes
* used for libgpg-error/gpgrt and gpgme. */
typedef
gpgme_error_t
(
*
colon_preprocessor_t
)
(
char
*
line
,
char
**
rline
);
struct
engine_gpg
{
char
*
file_name
;
char
*
version
;
char
*
lc_messages
;
char
*
lc_ctype
;
struct
arg_and_data_s
*
arglist
;
struct
arg_and_data_s
**
argtail
;
struct
{
int
fd
[
2
];
int
arg_loc
;
size_t
bufsize
;
char
*
buffer
;
size_t
readpos
;
int
eof
;
engine_status_handler_t
fnc
;
void
*
fnc_value
;
gpgme_status_cb_t
mon_cb
;
void
*
mon_cb_value
;
void
*
tag
;
}
status
;
/* This is a kludge - see the comment at colon_line_handler. */
struct
{
int
fd
[
2
];
int
arg_loc
;
size_t
bufsize
;
char
*
buffer
;
size_t
readpos
;
int
eof
;
engine_colon_line_handler_t
fnc
;
/* this indicate use of this structrue */
void
*
fnc_value
;
void
*
tag
;
colon_preprocessor_t
preprocess_fnc
;
}
colon
;
char
**
argv
;
struct
fd_data_map_s
*
fd_data_map
;
/* stuff needed for interactive (command) mode */
struct
{
int
used
;
int
fd
;
void
*
cb_data
;
int
idx
;
/* Index in fd_data_map */
gpgme_status_code_t
code
;
/* last code */
char
*
keyword
;
/* what has been requested (malloced) */
engine_command_handler_t
fnc
;
void
*
fnc_value
;
}
cmd
;
struct
gpgme_io_cbs
io_cbs
;
gpgme_pinentry_mode_t
pinentry_mode
;
char
request_origin
[
10
];
char
*
auto_key_locate
;
char
*
trust_model
;
struct
{
unsigned
int
use_gpgtar
:
1
;
unsigned
int
no_symkey_cache
:
1
;
unsigned
int
offline
:
1
;
unsigned
int
ignore_mdc_error
:
1
;
unsigned
int
include_key_block
:
1
;
unsigned
int
auto_key_import
:
1
;
unsigned
int
no_auto_check_trustdb
:
1
;
}
flags
;
/* NULL or the data object fed to --override_session_key-fd. */
gpgme_data_t
override_session_key
;
/* Memory data containing diagnostics (--logger-fd) of gpg */
gpgme_data_t
diagnostics
;
};
typedef
struct
engine_gpg
*
engine_gpg_t
;
static
void
gpg_io_event
(
void
*
engine
,
gpgme_event_io_t
type
,
void
*
type_data
)
{
engine_gpg_t
gpg
=
engine
;
TRACE
(
DEBUG_ENGINE
,
"gpgme:gpg_io_event"
,
gpg
,
"event %p, type %d, type_data %p"
,
gpg
->
io_cbs
.
event
,
type
,
type_data
);
if
(
gpg
->
io_cbs
.
event
)
(
*
gpg
->
io_cbs
.
event
)
(
gpg
->
io_cbs
.
event_priv
,
type
,
type_data
);
}
static
void
close_notify_handler
(
int
fd
,
void
*
opaque
)
{
engine_gpg_t
gpg
=
opaque
;
assert
(
fd
!=
-1
);
if
(
gpg
->
status
.
fd
[
0
]
==
fd
)
{
if
(
gpg
->
status
.
tag
)
(
*
gpg
->
io_cbs
.
remove
)
(
gpg
->
status
.
tag
);
gpg
->
status
.
fd
[
0
]
=
-1
;
}
else
if
(
gpg
->
status
.
fd
[
1
]
==
fd
)
gpg
->
status
.
fd
[
1
]
=
-1
;
else
if
(
gpg
->
colon
.
fd
[
0
]
==
fd
)
{
if
(
gpg
->
colon
.
tag
)
(
*
gpg
->
io_cbs
.
remove
)
(
gpg
->
colon
.
tag
);
gpg
->
colon
.
fd
[
0
]
=
-1
;
}
else
if
(
gpg
->
colon
.
fd
[
1
]
==
fd
)
gpg
->
colon
.
fd
[
1
]
=
-1
;
else
if
(
gpg
->
cmd
.
fd
==
fd
)
gpg
->
cmd
.
fd
=
-1
;
else
if
(
gpg
->
fd_data_map
)
{
int
i
;
for
(
i
=
0
;
gpg
->
fd_data_map
[
i
].
data
;
i
++
)
{
if
(
gpg
->
fd_data_map
[
i
].
fd
==
fd
)
{
if
(
gpg
->
fd_data_map
[
i
].
tag
)
(
*
gpg
->
io_cbs
.
remove
)
(
gpg
->
fd_data_map
[
i
].
tag
);
gpg
->
fd_data_map
[
i
].
fd
=
-1
;
break
;
}
if
(
gpg
->
fd_data_map
[
i
].
peer_fd
==
fd
)
{
gpg
->
fd_data_map
[
i
].
peer_fd
=
-1
;
break
;
}
}
}
}
static
void
_append_to_arglist
(
engine_gpg_t
gpg
,
struct
arg_and_data_s
*
a
)
{
a
->
next
=
NULL
;
*
gpg
->
argtail
=
a
;
gpg
->
argtail
=
&
a
->
next
;
}
static
void
_prepend_to_arglist
(
engine_gpg_t
gpg
,
struct
arg_and_data_s
*
a
)
{
a
->
next
=
gpg
->
arglist
;
if
(
!
gpg
->
arglist
)
{
/* If this is the first argument, we need to update the tail
pointer. */
gpg
->
argtail
=
&
a
->
next
;
}
gpg
->
arglist
=
a
;
}
/* If FRONT is true, push at the front of the list. Use this for
options added late in the process. */
static
gpgme_error_t
_add_arg
(
engine_gpg_t
gpg
,
const
char
*
prefix
,
const
char
*
arg
,
size_t
arglen
,
int
front
,
int
*
arg_locp
,
int
gpg_arg
)
{
struct
arg_and_data_s
*
a
;
size_t
prefixlen
=
prefix
?
strlen
(
prefix
)
:
0
;
assert
(
gpg
);
assert
(
arg
);
a
=
malloc
(
offsetof
(
struct
arg_and_data_s
,
arg
)
+
prefixlen
+
arglen
+
1
);
if
(
!
a
)
return
gpg_error_from_syserror
();
a
->
data
=
NULL
;
a
->
dup_to
=
-1
;
a
->
arg_locp
=
arg_locp
;
a
->
gpg_arg
=
gpg_arg
;
if
(
prefixlen
)
memcpy
(
a
->
arg
,
prefix
,
prefixlen
);
memcpy
(
a
->
arg
+
prefixlen
,
arg
,
arglen
);
a
->
arg
[
prefixlen
+
arglen
]
=
0
;
if
(
front
)
_prepend_to_arglist
(
gpg
,
a
);
else
_append_to_arglist
(
gpg
,
a
);
return
0
;
}
static
gpgme_error_t
add_arg_ext
(
engine_gpg_t
gpg
,
const
char
*
arg
,
int
front
)
{
return
_add_arg
(
gpg
,
NULL
,
arg
,
strlen
(
arg
),
front
,
NULL
,
0
);
}
static
gpgme_error_t
add_arg_with_locp
(
engine_gpg_t
gpg
,
const
char
*
arg
,
int
*
locp
,
int
front
)
{
return
_add_arg
(
gpg
,
NULL
,
arg
,
strlen
(
arg
),
front
,
locp
,
0
);
}
static
gpgme_error_t
add_arg
(
engine_gpg_t
gpg
,
const
char
*
arg
)
{
return
_add_arg
(
gpg
,
NULL
,
arg
,
strlen
(
arg
),
0
,
NULL
,
0
);
}
static
gpgme_error_t
add_arg_pfx
(
engine_gpg_t
gpg
,
const
char
*
prefix
,
const
char
*
arg
)
{
return
_add_arg
(
gpg
,
prefix
,
arg
,
strlen
(
arg
),
0
,
NULL
,
0
);
}
static
gpgme_error_t
add_gpg_arg
(
engine_gpg_t
gpg
,
const
char
*
arg
)
{
return
_add_arg
(
gpg
,
NULL
,
arg
,
strlen
(
arg
),
0
,
NULL
,
1
);
}
static
gpgme_error_t
add_gpg_arg_with_value
(
engine_gpg_t
gpg
,
const
char
*
arg
,
const
char
*
value
,
int
front
)
{
return
_add_arg
(
gpg
,
arg
,
value
,
strlen
(
value
),
front
,
NULL
,
1
);
}
static
gpgme_error_t
add_arg_len
(
engine_gpg_t
gpg
,
const
char
*
prefix
,
const
char
*
arg
,
size_t
arglen
)
{
return
_add_arg
(
gpg
,
prefix
,
arg
,
arglen
,
0
,
NULL
,
0
);
}
static
gpgme_error_t
add_data_ext
(
engine_gpg_t
gpg
,
gpgme_data_t
data
,
int
dup_to
,
int
inbound
,
int
front
)
{
struct
arg_and_data_s
*
a
;
assert
(
gpg
);
assert
(
data
);
a
=
malloc
(
offsetof
(
struct
arg_and_data_s
,
arg
));
if
(
!
a
)
return
gpg_error_from_syserror
();
a
->
data
=
data
;
a
->
inbound
=
inbound
;
a
->
arg_locp
=
NULL
;
if
(
dup_to
==
-2
)
{
a
->
print_fd
=
1
;
a
->
dup_to
=
-1
;
}
else
{
a
->
print_fd
=
0
;
a
->
dup_to
=
dup_to
;
}
if
(
front
)
_prepend_to_arglist
(
gpg
,
a
);
else
_append_to_arglist
(
gpg
,
a
);
return
0
;
}
static
gpgme_error_t
add_data
(
engine_gpg_t
gpg
,
gpgme_data_t
data
,
int
dup_to
,
int
inbound
)
{
return
add_data_ext
(
gpg
,
data
,
dup_to
,
inbound
,
0
);
}
/* Return true if the engine's version is at least VERSION. */
static
int
have_gpg_version
(
engine_gpg_t
gpg
,
const
char
*
version
)
{
return
_gpgme_compare_versions
(
gpg
->
version
,
version
);
}
static
char
*
gpg_get_version
(
const
char
*
file_name
)
{
return
_gpgme_get_program_version
(
file_name
?
file_name
:
_gpgme_get_default_gpg_name
());
}
static
const
char
*
gpg_get_req_version
(
void
)
{
return
"1.4.0"
;
}
static
void
free_argv
(
char
**
argv
)
{
int
i
;
for
(
i
=
0
;
argv
[
i
];
i
++
)
free
(
argv
[
i
]);
free
(
argv
);
}
static
void
free_fd_data_map
(
struct
fd_data_map_s
*
fd_data_map
)
{
int
i
;
if
(
!
fd_data_map
)
return
;
for
(
i
=
0
;
fd_data_map
[
i
].
data
;
i
++
)
{
if
(
fd_data_map
[
i
].
fd
!=
-1
)
_gpgme_io_close
(
fd_data_map
[
i
].
fd
);
if
(
fd_data_map
[
i
].
peer_fd
!=
-1
)
_gpgme_io_close
(
fd_data_map
[
i
].
peer_fd
);
/* Don't release data because this is only a reference. */
}
free
(
fd_data_map
);
}
static
gpgme_error_t
gpg_cancel
(
void
*
engine
)
{
engine_gpg_t
gpg
=
engine
;
if
(
!
gpg
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
/* If gpg may be waiting for a cmd, close the cmd fd first. On
Windows, close operations block on the reader/writer thread. */
if
(
gpg
->
cmd
.
used
)
{
if
(
gpg
->
cmd
.
fd
!=
-1
)
_gpgme_io_close
(
gpg
->
cmd
.
fd
);
else
if
(
gpg
->
fd_data_map
&&
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
fd
!=
-1
)
_gpgme_io_close
(
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
fd
);
}
if
(
gpg
->
status
.
fd
[
0
]
!=
-1
)
_gpgme_io_close
(
gpg
->
status
.
fd
[
0
]);
if
(
gpg
->
status
.
fd
[
1
]
!=
-1
)
_gpgme_io_close
(
gpg
->
status
.
fd
[
1
]);
if
(
gpg
->
colon
.
fd
[
0
]
!=
-1
)
_gpgme_io_close
(
gpg
->
colon
.
fd
[
0
]);
if
(
gpg
->
colon
.
fd
[
1
]
!=
-1
)
_gpgme_io_close
(
gpg
->
colon
.
fd
[
1
]);
if
(
gpg
->
fd_data_map
)
{
free_fd_data_map
(
gpg
->
fd_data_map
);
gpg
->
fd_data_map
=
NULL
;
}
return
0
;
}
static
void
gpg_release
(
void
*
engine
)
{
engine_gpg_t
gpg
=
engine
;
if
(
!
gpg
)
return
;
gpg_cancel
(
engine
);
if
(
gpg
->
file_name
)
free
(
gpg
->
file_name
);
if
(
gpg
->
version
)
free
(
gpg
->
version
);
if
(
gpg
->
lc_messages
)
free
(
gpg
->
lc_messages
);
if
(
gpg
->
lc_ctype
)
free
(
gpg
->
lc_ctype
);
while
(
gpg
->
arglist
)
{
struct
arg_and_data_s
*
next
=
gpg
->
arglist
->
next
;
free
(
gpg
->
arglist
);
gpg
->
arglist
=
next
;
}
if
(
gpg
->
status
.
buffer
)
free
(
gpg
->
status
.
buffer
);
if
(
gpg
->
colon
.
buffer
)
free
(
gpg
->
colon
.
buffer
);
if
(
gpg
->
argv
)
free_argv
(
gpg
->
argv
);
if
(
gpg
->
cmd
.
keyword
)
free
(
gpg
->
cmd
.
keyword
);
free
(
gpg
->
auto_key_locate
);
free
(
gpg
->
trust_model
);
gpgme_data_release
(
gpg
->
override_session_key
);
gpgme_data_release
(
gpg
->
diagnostics
);
free
(
gpg
);
}
static
gpgme_error_t
gpg_new
(
void
**
engine
,
const
char
*
file_name
,
const
char
*
home_dir
,
const
char
*
version
)
{
engine_gpg_t
gpg
;
gpgme_error_t
rc
=
0
;
char
*
dft_display
=
NULL
;
char
dft_ttyname
[
64
];
char
*
dft_ttytype
=
NULL
;
char
*
env_tty
=
NULL
;
gpg
=
calloc
(
1
,
sizeof
*
gpg
);
if
(
!
gpg
)
return
gpg_error_from_syserror
();
if
(
file_name
)
{
gpg
->
file_name
=
strdup
(
file_name
);
if
(
!
gpg
->
file_name
)
{
rc
=
gpg_error_from_syserror
();
goto
leave
;
}
}
if
(
version
)
{
gpg
->
version
=
strdup
(
version
);
if
(
!
gpg
->
version
)
{
rc
=
gpg_error_from_syserror
();
goto
leave
;
}
}
gpg
->
argtail
=
&
gpg
->
arglist
;
gpg
->
status
.
fd
[
0
]
=
-1
;
gpg
->
status
.
fd
[
1
]
=
-1
;
gpg
->
colon
.
fd
[
0
]
=
-1
;
gpg
->
colon
.
fd
[
1
]
=
-1
;
gpg
->
cmd
.
fd
=
-1
;
gpg
->
cmd
.
idx
=
-1
;
/* Allocate the read buffer for the status pipe. */
gpg
->
status
.
bufsize
=
1024
;
gpg
->
status
.
readpos
=
0
;
gpg
->
status
.
buffer
=
malloc
(
gpg
->
status
.
bufsize
);
if
(
!
gpg
->
status
.
buffer
)
{
rc
=
gpg_error_from_syserror
();
goto
leave
;
}
/* In any case we need a status pipe - create it right here and
don't handle it with our generic gpgme_data_t mechanism. */
if
(
_gpgme_io_pipe
(
gpg
->
status
.
fd
,
1
)
==
-1
)
{
rc
=
gpg_error_from_syserror
();
goto
leave
;
}
if
(
_gpgme_io_set_close_notify
(
gpg
->
status
.
fd
[
0
],
close_notify_handler
,
gpg
)
||
_gpgme_io_set_close_notify
(
gpg
->
status
.
fd
[
1
],
close_notify_handler
,
gpg
))
{
rc
=
gpg_error
(
GPG_ERR_GENERAL
);
goto
leave
;
}
gpg
->
status
.
eof
=
0
;
if
(
home_dir
)
{
rc
=
add_gpg_arg_with_value
(
gpg
,
"--homedir="
,
home_dir
,
0
);
if
(
rc
)
goto
leave
;
}
rc
=
add_gpg_arg
(
gpg
,
"--no-tty"
);
if
(
!
rc
)
rc
=
add_gpg_arg
(
gpg
,
"--charset=utf8"
);
if
(
!
rc
)
rc
=
add_gpg_arg
(
gpg
,
"--enable-progress-filter"
);
if
(
!
rc
&&
have_gpg_version
(
gpg
,
"2.1.11"
))
rc
=
add_gpg_arg
(
gpg
,
"--exit-on-status-write-error"
);
if
(
rc
)
goto
leave
;
rc
=
_gpgme_getenv
(
"DISPLAY"
,
&
dft_display
);
if
(
rc
)
goto
leave
;
if
(
dft_display
)
{
rc
=
add_gpg_arg_with_value
(
gpg
,
"--display="
,
dft_display
,
0
);
free
(
dft_display
);
if
(
rc
)
goto
leave
;
}
rc
=
_gpgme_getenv
(
"GPG_TTY"
,
&
env_tty
);
if
(
isatty
(
1
)
||
env_tty
||
rc
)
{
int
err
=
0
;
if
(
rc
)
goto
leave
;
else
if
(
env_tty
)
{
snprintf
(
dft_ttyname
,
sizeof
(
dft_ttyname
),
"%s"
,
env_tty
);
free
(
env_tty
);
}
else
err
=
ttyname_r
(
1
,
dft_ttyname
,
sizeof
(
dft_ttyname
));
/* Even though isatty() returns 1, ttyname_r() may fail in many
ways, e.g., when /dev/pts is not accessible under chroot. */
if
(
!
err
)
{
if
(
*
dft_ttyname
)
rc
=
add_gpg_arg_with_value
(
gpg
,
"--ttyname="
,
dft_ttyname
,
0
);
else
rc
=
0
;
if
(
!
rc
)
{
rc
=
_gpgme_getenv
(
"TERM"
,
&
dft_ttytype
);
if
(
rc
)
goto
leave
;
if
(
dft_ttytype
)
rc
=
add_gpg_arg_with_value
(
gpg
,
"--ttytype="
,
dft_ttytype
,
0
);
free
(
dft_ttytype
);
}
if
(
rc
)
goto
leave
;
}
}
leave
:
if
(
rc
)
gpg_release
(
gpg
);
else
*
engine
=
gpg
;
return
rc
;
}
/* Copy flags from CTX into the engine object. */
static
void
gpg_set_engine_flags
(
void
*
engine
,
const
gpgme_ctx_t
ctx
)
{
engine_gpg_t
gpg
=
engine
;
if
(
ctx
->
request_origin
&&
have_gpg_version
(
gpg
,
"2.2.6"
))
{
if
(
strlen
(
ctx
->
request_origin
)
+
1
>
sizeof
gpg
->
request_origin
)
strcpy
(
gpg
->
request_origin
,
"xxx"
);
/* Too long - force error */
else
strcpy
(
gpg
->
request_origin
,
ctx
->
request_origin
);
}
else
*
gpg
->
request_origin
=
0
;
if
(
ctx
->
auto_key_locate
&&
have_gpg_version
(
gpg
,
"2.1.18"
))
{
if
(
gpg
->
auto_key_locate
)
free
(
gpg
->
auto_key_locate
);
gpg
->
auto_key_locate
=
_gpgme_strconcat
(
"--auto-key-locate="
,
ctx
->
auto_key_locate
,
NULL
);
}
if
(
ctx
->
trust_model
&&
strlen
(
ctx
->
trust_model
))
{
if
(
gpg
->
trust_model
)
free
(
gpg
->
trust_model
);
gpg
->
trust_model
=
_gpgme_strconcat
(
"--trust-model="
,
ctx
->
trust_model
,
NULL
);
}
gpg
->
flags
.
no_symkey_cache
=
(
ctx
->
no_symkey_cache
&&
have_gpg_version
(
gpg
,
"2.2.7"
));
gpg
->
flags
.
offline
=
(
ctx
->
offline
&&
have_gpg_version
(
gpg
,
"2.1.23"
));
gpg
->
flags
.
ignore_mdc_error
=
!!
ctx
->
ignore_mdc_error
;
if
(
have_gpg_version
(
gpg
,
"2.2.20"
))
{
if
(
ctx
->
auto_key_import
)
gpg
->
flags
.
auto_key_import
=
1
;
if
(
ctx
->
include_key_block
)
gpg
->
flags
.
include_key_block
=
1
;
}
gpg
->
flags
.
no_auto_check_trustdb
=
!!
ctx
->
no_auto_check_trustdb
;
}
static
gpgme_error_t
gpg_set_locale
(
void
*
engine
,
int
category
,
const
char
*
value
)
{
engine_gpg_t
gpg
=
engine
;
if
(
0
)
;
#ifdef LC_CTYPE
else
if
(
category
==
LC_CTYPE
)
{
if
(
gpg
->
lc_ctype
)
{
free
(
gpg
->
lc_ctype
);
gpg
->
lc_ctype
=
NULL
;
}
if
(
value
)
{
gpg
->
lc_ctype
=
strdup
(
value
);
if
(
!
gpg
->
lc_ctype
)
return
gpg_error_from_syserror
();
}
}
#endif
#ifdef LC_MESSAGES
else
if
(
category
==
LC_MESSAGES
)
{
if
(
gpg
->
lc_messages
)
{
free
(
gpg
->
lc_messages
);
gpg
->
lc_messages
=
NULL
;
}
if
(
value
)
{
gpg
->
lc_messages
=
strdup
(
value
);
if
(
!
gpg
->
lc_messages
)
return
gpg_error_from_syserror
();
}
}
#endif
/* LC_MESSAGES */
else
return
gpg_error
(
GPG_ERR_INV_VALUE
);
return
0
;
}
/* This sets a status callback for monitoring status lines before they
* are passed to a caller set handler. */
static
void
gpg_set_status_cb
(
void
*
engine
,
gpgme_status_cb_t
cb
,
void
*
cb_value
)
{
engine_gpg_t
gpg
=
engine
;
gpg
->
status
.
mon_cb
=
cb
;
gpg
->
status
.
mon_cb_value
=
cb_value
;
}
/* Note, that the status_handler is allowed to modify the args
value. */
static
void
gpg_set_status_handler
(
void
*
engine
,
engine_status_handler_t
fnc
,
void
*
fnc_value
)
{
engine_gpg_t
gpg
=
engine
;
gpg
->
status
.
fnc
=
fnc
;
gpg
->
status
.
fnc_value
=
fnc_value
;
}
/* Kludge to process --with-colon output. */
static
gpgme_error_t
gpg_set_colon_line_handler
(
void
*
engine
,
engine_colon_line_handler_t
fnc
,
void
*
fnc_value
)
{
engine_gpg_t
gpg
=
engine
;
gpg
->
colon
.
bufsize
=
1024
;
gpg
->
colon
.
readpos
=
0
;
gpg
->
colon
.
buffer
=
malloc
(
gpg
->
colon
.
bufsize
);
if
(
!
gpg
->
colon
.
buffer
)
return
gpg_error_from_syserror
();
if
(
_gpgme_io_pipe
(
gpg
->
colon
.
fd
,
1
)
==
-1
)
{
int
saved_err
=
gpg_error_from_syserror
();
free
(
gpg
->
colon
.
buffer
);
gpg
->
colon
.
buffer
=
NULL
;
return
saved_err
;
}
if
(
_gpgme_io_set_close_notify
(
gpg
->
colon
.
fd
[
0
],
close_notify_handler
,
gpg
)
||
_gpgme_io_set_close_notify
(
gpg
->
colon
.
fd
[
1
],
close_notify_handler
,
gpg
))
return
gpg_error
(
GPG_ERR_GENERAL
);
gpg
->
colon
.
eof
=
0
;
gpg
->
colon
.
fnc
=
fnc
;
gpg
->
colon
.
fnc_value
=
fnc_value
;
return
0
;
}
static
gpgme_error_t
command_handler
(
void
*
opaque
,
int
fd
)
{
struct
io_cb_data
*
data
=
(
struct
io_cb_data
*
)
opaque
;
engine_gpg_t
gpg
=
(
engine_gpg_t
)
data
->
handler_value
;
gpgme_error_t
err
;
int
processed
=
0
;
assert
(
gpg
->
cmd
.
used
);
assert
(
gpg
->
cmd
.
code
);
assert
(
gpg
->
cmd
.
fnc
);
err
=
gpg
->
cmd
.
fnc
(
gpg
->
cmd
.
fnc_value
,
gpg
->
cmd
.
code
,
gpg
->
cmd
.
keyword
,
fd
,
&
processed
);
gpg
->
cmd
.
code
=
0
;
/* And sleep again until read_status will wake us up again. */
/* XXX We must check if there are any more fds active after removing
this one. */
(
*
gpg
->
io_cbs
.
remove
)
(
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
tag
);
gpg
->
cmd
.
fd
=
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
fd
;
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
fd
=
-1
;
if
(
err
)
return
err
;
/* We always need to send at least a newline character. */
if
(
!
processed
)
_gpgme_io_write
(
fd
,
"
\n
"
,
1
);
return
0
;
}
/* The FNC will be called to get a value for one of the commands with
* a key KEY. If the code passed to FNC is 0, the function may
* release resources associated with the returned value from another
* call. To match such a second call to a first call, the returned
* value from the first call is passed as keyword. */
static
gpgme_error_t
gpg_set_command_handler
(
void
*
engine
,
engine_command_handler_t
fnc
,
void
*
fnc_value
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
rc
;
rc
=
add_arg
(
gpg
,
"--command-fd"
);
if
(
rc
)
return
rc
;
/* This is a hack. We don't have a real data object. The only
thing that matters is that we use something unique, so we use the
address of the cmd structure in the gpg object. */
rc
=
add_data
(
gpg
,
(
void
*
)
&
gpg
->
cmd
,
-2
,
0
);
if
(
rc
)
return
rc
;
gpg
->
cmd
.
fnc
=
fnc
;
gpg
->
cmd
.
cb_data
=
(
void
*
)
&
gpg
->
cmd
;
gpg
->
cmd
.
fnc_value
=
fnc_value
;
gpg
->
cmd
.
used
=
1
;
return
0
;
}
static
gpgme_error_t
build_argv
(
engine_gpg_t
gpg
,
const
char
*
pgmname
)
{
gpgme_error_t
err
;
struct
arg_and_data_s
*
a
;
struct
fd_data_map_s
*
fd_data_map
=
NULL
;
size_t
datac
=
0
,
argc
=
0
,
allocated_argc
=
0
;
char
**
argv
=
NULL
;
int
need_special
=
0
;
int
use_agent
=
0
;
char
*
p
;
if
(
_gpgme_in_gpg_one_mode
())
{
/* In GnuPG-1 mode we don't want to use the agent with a
malformed environment variable. This is only a very basic
test but sufficient to make our life in the regression tests
easier. With GnuPG-2 the agent is anyway required and on
modern installations GPG_AGENT_INFO is optional. */
err
=
_gpgme_getenv
(
"GPG_AGENT_INFO"
,
&
p
);
if
(
err
)
return
err
;
use_agent
=
(
p
&&
strchr
(
p
,
':'
));
if
(
p
)
free
(
p
);
}
if
(
gpg
->
argv
)
{
free_argv
(
gpg
->
argv
);
gpg
->
argv
=
NULL
;
}
if
(
gpg
->
fd_data_map
)
{
free_fd_data_map
(
gpg
->
fd_data_map
);
gpg
->
fd_data_map
=
NULL
;
}
argc
++
;
/* For argv[0]. */
for
(
a
=
gpg
->
arglist
;
a
;
a
=
a
->
next
)
{
argc
+=
1
+
(
gpg
->
flags
.
use_gpgtar
&&
a
->
gpg_arg
);
if
(
a
->
data
)
{
/*fprintf (stderr, "build_argv: data\n" );*/
datac
++
;
if
(
a
->
dup_to
==
-1
&&
!
a
->
print_fd
)
need_special
=
1
;
}
else
{
/* fprintf (stderr, "build_argv: arg=`%s'\n", a->arg );*/
}
}
if
(
need_special
)
argc
++
;
if
(
use_agent
)
argc
++
;
if
(
*
gpg
->
request_origin
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
auto_key_locate
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
trust_model
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
flags
.
no_symkey_cache
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
flags
.
ignore_mdc_error
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
flags
.
offline
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
flags
.
no_auto_check_trustdb
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
gpg
->
pinentry_mode
)
argc
+=
1
+
!!
gpg
->
flags
.
use_gpgtar
;
if
(
!
gpg
->
cmd
.
used
)
argc
++
;
/* --batch */
argv
=
calloc
(
argc
+
1
,
sizeof
*
argv
);
allocated_argc
=
argc
;
if
(
!
argv
)
return
gpg_error_from_syserror
();
fd_data_map
=
calloc
(
datac
+
1
,
sizeof
*
fd_data_map
);
if
(
!
fd_data_map
)
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
=
datac
=
0
;
argv
[
argc
]
=
strdup
(
_gpgme_get_basename
(
pgmname
));
/* argv[0] */
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
if
(
need_special
)
{
argv
[
argc
]
=
strdup
(
"--enable-special-filenames"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
use_agent
)
{
argv
[
argc
]
=
strdup
(
"--use-agent"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
/* NOTE: If you add a new argument here. Ensure that
argc is counted up above to allocate enough memory. */
if
(
*
gpg
->
request_origin
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
_gpgme_strconcat
(
"--request-origin="
,
gpg
->
request_origin
,
NULL
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
auto_key_locate
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
gpg
->
auto_key_locate
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
trust_model
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
gpg
->
trust_model
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
flags
.
no_symkey_cache
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
"--no-symkey-cache"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
flags
.
ignore_mdc_error
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
"--ignore-mdc-error"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
flags
.
offline
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
"--disable-dirmngr"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
flags
.
no_auto_check_trustdb
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
"--no-auto-check-trustdb"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
if
(
gpg
->
pinentry_mode
&&
have_gpg_version
(
gpg
,
"2.1.0"
))
{
const
char
*
s
=
NULL
;
switch
(
gpg
->
pinentry_mode
)
{
case
GPGME_PINENTRY_MODE_DEFAULT
:
break
;
case
GPGME_PINENTRY_MODE_ASK
:
s
=
"--pinentry-mode=ask"
;
break
;
case
GPGME_PINENTRY_MODE_CANCEL
:
s
=
"--pinentry-mode=cancel"
;
break
;
case
GPGME_PINENTRY_MODE_ERROR
:
s
=
"--pinentry-mode=error"
;
break
;
case
GPGME_PINENTRY_MODE_LOOPBACK
:
s
=
"--pinentry-mode=loopback"
;
break
;
}
if
(
s
)
{
if
(
gpg
->
flags
.
use_gpgtar
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
s
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
}
if
(
!
gpg
->
cmd
.
used
)
{
argv
[
argc
]
=
strdup
(
"--batch"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
for
(
a
=
gpg
->
arglist
;
a
;
a
=
a
->
next
)
{
if
(
a
->
arg_locp
)
*
(
a
->
arg_locp
)
=
argc
;
if
(
a
->
data
)
{
/* Create a pipe to pass it down to gpg. */
fd_data_map
[
datac
].
inbound
=
a
->
inbound
;
/* Create a pipe. */
{
int
fds
[
2
];
if
(
_gpgme_io_pipe
(
fds
,
fd_data_map
[
datac
].
inbound
?
1
:
0
)
==
-1
)
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
if
(
_gpgme_io_set_close_notify
(
fds
[
0
],
close_notify_handler
,
gpg
)
||
_gpgme_io_set_close_notify
(
fds
[
1
],
close_notify_handler
,
gpg
))
{
/* We leak fd_data_map and the fds. This is not easy
to avoid and given that we reach this here only
after a malloc failure for a small object, it is
probably better not to do anything. */
return
gpg_error
(
GPG_ERR_GENERAL
);
}
/* If the data_type is FD, we have to do a dup2 here. */
if
(
fd_data_map
[
datac
].
inbound
)
{
fd_data_map
[
datac
].
fd
=
fds
[
0
];
fd_data_map
[
datac
].
peer_fd
=
fds
[
1
];
}
else
{
fd_data_map
[
datac
].
fd
=
fds
[
1
];
fd_data_map
[
datac
].
peer_fd
=
fds
[
0
];
}
}
/* Hack to get hands on the fd later. */
if
(
gpg
->
cmd
.
used
)
{
if
(
gpg
->
cmd
.
cb_data
==
a
->
data
)
{
assert
(
gpg
->
cmd
.
idx
==
-1
);
gpg
->
cmd
.
idx
=
datac
;
}
}
fd_data_map
[
datac
].
data
=
a
->
data
;
fd_data_map
[
datac
].
dup_to
=
a
->
dup_to
;
if
(
a
->
dup_to
==
-1
)
{
char
*
ptr
;
int
buflen
=
25
;
argv
[
argc
]
=
malloc
(
buflen
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
ptr
=
argv
[
argc
];
if
(
!
a
->
print_fd
)
{
*
(
ptr
++
)
=
'-'
;
*
(
ptr
++
)
=
'&'
;
buflen
-=
2
;
}
_gpgme_io_fd2str
(
ptr
,
buflen
,
fd_data_map
[
datac
].
peer_fd
);
fd_data_map
[
datac
].
arg_loc
=
argc
;
argc
++
;
}
datac
++
;
}
else
{
if
(
gpg
->
flags
.
use_gpgtar
&&
a
->
gpg_arg
)
{
argv
[
argc
]
=
strdup
(
"--gpg-args"
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
argv
[
argc
]
=
strdup
(
a
->
arg
);
if
(
!
argv
[
argc
])
{
err
=
gpg_error_from_syserror
();
if
(
err
)
goto
leave
;
}
argc
++
;
}
}
/* Saveguard against adding a new argument without properly
counting up the argc used for allocation at the beginning
of this function. It would be better to use a dynamically
allocated array like ccparray in gnupg. */
assert
(
argc
<=
allocated_argc
);
leave
:
if
(
err
)
{
free
(
fd_data_map
);
free_argv
(
argv
);
}
else
{
gpg
->
argv
=
argv
;
gpg
->
fd_data_map
=
fd_data_map
;
}
return
err
;
}
static
gpgme_error_t
add_io_cb
(
engine_gpg_t
gpg
,
int
fd
,
int
dir
,
gpgme_io_cb_t
handler
,
void
*
data
,
void
**
tag
)
{
gpgme_error_t
err
;
err
=
(
*
gpg
->
io_cbs
.
add
)
(
gpg
->
io_cbs
.
add_priv
,
fd
,
dir
,
handler
,
data
,
tag
);
if
(
err
)
return
err
;
if
(
!
dir
)
/* FIXME Kludge around poll() problem. */
err
=
_gpgme_io_set_nonblocking
(
fd
);
return
err
;
}
/* Handle the status output of GnuPG. This function does read entire
lines and passes them as C strings to the callback function (we can
use C Strings because the status output is always UTF-8 encoded).
Of course we have to buffer the lines to cope with long lines
e.g. with a large user ID. Note: We can optimize this to only cope
with status line code we know about and skip all other stuff
without buffering (i.e. without extending the buffer). */
static
gpgme_error_t
read_status
(
engine_gpg_t
gpg
)
{
char
*
p
;
int
nread
;
size_t
bufsize
=
gpg
->
status
.
bufsize
;
char
*
buffer
=
gpg
->
status
.
buffer
;
size_t
readpos
=
gpg
->
status
.
readpos
;
gpgme_error_t
err
;
assert
(
buffer
);
if
(
bufsize
-
readpos
<
256
)
{
/* Need more room for the read. */
bufsize
+=
1024
;
buffer
=
realloc
(
buffer
,
bufsize
);
if
(
!
buffer
)
return
gpg_error_from_syserror
();
}
nread
=
_gpgme_io_read
(
gpg
->
status
.
fd
[
0
],
buffer
+
readpos
,
bufsize
-
readpos
);
if
(
nread
==
-1
)
return
gpg_error_from_syserror
();
if
(
!
nread
)
{
err
=
0
;
gpg
->
status
.
eof
=
1
;
if
(
gpg
->
status
.
mon_cb
)
err
=
gpg
->
status
.
mon_cb
(
gpg
->
status
.
mon_cb_value
,
""
,
""
);
if
(
gpg
->
status
.
fnc
)
{
char
emptystring
[
1
]
=
{
0
};
err
=
gpg
->
status
.
fnc
(
gpg
->
status
.
fnc_value
,
GPGME_STATUS_EOF
,
emptystring
);
if
(
gpg_err_code
(
err
)
==
GPG_ERR_FALSE
)
err
=
0
;
/* Drop special error code. */
}
return
err
;
}
while
(
nread
>
0
)
{
for
(
p
=
buffer
+
readpos
;
nread
;
nread
--
,
p
++
)
{
if
(
*
p
==
'\n'
)
{
/* (we require that the last line is terminated by a LF) */
if
(
p
>
buffer
&&
p
[
-1
]
==
'\r'
)
p
[
-1
]
=
0
;
*
p
=
0
;
if
(
!
strncmp
(
buffer
,
"[GNUPG:] "
,
9
)
&&
buffer
[
9
]
>=
'A'
&&
buffer
[
9
]
<=
'Z'
)
{
char
*
rest
;
gpgme_status_code_t
r
;
rest
=
strchr
(
buffer
+
9
,
' '
);
if
(
!
rest
)
rest
=
p
;
/* Set to an empty string. */
else
*
rest
++
=
0
;
r
=
_gpgme_parse_status
(
buffer
+
9
);
if
(
gpg
->
status
.
mon_cb
&&
r
!=
GPGME_STATUS_PROGRESS
)
{
/* Note that we call the monitor even if we do
* not know the status code (r < 0). */
err
=
gpg
->
status
.
mon_cb
(
gpg
->
status
.
mon_cb_value
,
buffer
+
9
,
rest
);
if
(
err
)
return
err
;
}
if
(
r
>=
0
)
{
if
(
gpg
->
cmd
.
used
&&
(
r
==
GPGME_STATUS_GET_BOOL
||
r
==
GPGME_STATUS_GET_LINE
||
r
==
GPGME_STATUS_GET_HIDDEN
))
{
gpg
->
cmd
.
code
=
r
;
if
(
gpg
->
cmd
.
keyword
)
free
(
gpg
->
cmd
.
keyword
);
gpg
->
cmd
.
keyword
=
strdup
(
rest
);
if
(
!
gpg
->
cmd
.
keyword
)
return
gpg_error_from_syserror
();
/* This should be the last thing we have
received and the next thing will be that
the command handler does its action. */
if
(
nread
>
1
)
TRACE
(
DEBUG_CTX
,
"gpgme:read_status"
,
0
,
"error: unexpected data"
);
add_io_cb
(
gpg
,
gpg
->
cmd
.
fd
,
0
,
command_handler
,
gpg
,
&
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
tag
);
gpg
->
fd_data_map
[
gpg
->
cmd
.
idx
].
fd
=
gpg
->
cmd
.
fd
;
gpg
->
cmd
.
fd
=
-1
;
}
else
if
(
gpg
->
status
.
fnc
)
{
err
=
gpg
->
status
.
fnc
(
gpg
->
status
.
fnc_value
,
r
,
rest
);
if
(
gpg_err_code
(
err
)
==
GPG_ERR_FALSE
)
err
=
0
;
/* Drop special error code. */
if
(
err
)
return
err
;
}
}
}
/* To reuse the buffer for the next line we have to
shift the remaining data to the buffer start and
restart the loop Hmmm: We can optimize this function
by looking forward in the buffer to see whether a
second complete line is available and in this case
avoid the memmove for this line. */
nread
--
;
p
++
;
if
(
nread
)
memmove
(
buffer
,
p
,
nread
);
readpos
=
0
;
break
;
/* the for loop */
}
else
readpos
++
;
}
}
/* Update the gpg object. */
gpg
->
status
.
bufsize
=
bufsize
;
gpg
->
status
.
buffer
=
buffer
;
gpg
->
status
.
readpos
=
readpos
;
return
0
;
}
static
gpgme_error_t
status_handler
(
void
*
opaque
,
int
fd
)
{
struct
io_cb_data
*
data
=
(
struct
io_cb_data
*
)
opaque
;
engine_gpg_t
gpg
=
(
engine_gpg_t
)
data
->
handler_value
;
int
err
;
assert
(
fd
==
gpg
->
status
.
fd
[
0
]);
err
=
read_status
(
gpg
);
if
(
err
)
return
err
;
if
(
gpg
->
status
.
eof
)
_gpgme_io_close
(
fd
);
return
0
;
}
static
gpgme_error_t
read_colon_line
(
engine_gpg_t
gpg
)
{
char
*
p
;
int
nread
;
size_t
bufsize
=
gpg
->
colon
.
bufsize
;
char
*
buffer
=
gpg
->
colon
.
buffer
;
size_t
readpos
=
gpg
->
colon
.
readpos
;
assert
(
buffer
);
if
(
bufsize
-
readpos
<
256
)
{
/* Need more room for the read. */
bufsize
+=
1024
;
buffer
=
realloc
(
buffer
,
bufsize
);
if
(
!
buffer
)
return
gpg_error_from_syserror
();
}
nread
=
_gpgme_io_read
(
gpg
->
colon
.
fd
[
0
],
buffer
+
readpos
,
bufsize
-
readpos
);
if
(
nread
==
-1
)
return
gpg_error_from_syserror
();
if
(
!
nread
)
{
gpg
->
colon
.
eof
=
1
;
assert
(
gpg
->
colon
.
fnc
);
gpg
->
colon
.
fnc
(
gpg
->
colon
.
fnc_value
,
NULL
);
return
0
;
}
while
(
nread
>
0
)
{
for
(
p
=
buffer
+
readpos
;
nread
;
nread
--
,
p
++
)
{
if
(
*
p
==
'\n'
)
{
/* (we require that the last line is terminated by a LF)
and we skip empty lines. Note: we use UTF8 encoding
and escaping of special characters. We require at
least one colon to cope with some other printed
information. */
*
p
=
0
;
if
(
*
buffer
&&
strchr
(
buffer
,
':'
))
{
char
*
line
=
NULL
;
if
(
gpg
->
colon
.
preprocess_fnc
)
{
gpgme_error_t
err
;
err
=
gpg
->
colon
.
preprocess_fnc
(
buffer
,
&
line
);
if
(
err
)
return
err
;
}
assert
(
gpg
->
colon
.
fnc
);
if
(
line
)
{
char
*
linep
=
line
;
char
*
endp
;
do
{
endp
=
strchr
(
linep
,
'\n'
);
if
(
endp
)
*
endp
++
=
0
;
gpg
->
colon
.
fnc
(
gpg
->
colon
.
fnc_value
,
linep
);
linep
=
endp
;
}
while
(
linep
&&
*
linep
);
gpgrt_free
(
line
);
}
else
gpg
->
colon
.
fnc
(
gpg
->
colon
.
fnc_value
,
buffer
);
}
/* To reuse the buffer for the next line we have to
shift the remaining data to the buffer start and
restart the loop Hmmm: We can optimize this function
by looking forward in the buffer to see whether a
second complete line is available and in this case
avoid the memmove for this line. */
nread
--
;
p
++
;
if
(
nread
)
memmove
(
buffer
,
p
,
nread
);
readpos
=
0
;
break
;
/* The for loop. */
}
else
readpos
++
;
}
}
/* Update the gpg object. */
gpg
->
colon
.
bufsize
=
bufsize
;
gpg
->
colon
.
buffer
=
buffer
;
gpg
->
colon
.
readpos
=
readpos
;
return
0
;
}
/* This colonline handler thing is not the clean way to do it. It
might be better to enhance the gpgme_data_t object to act as a wrapper
for a callback. Same goes for the status thing. For now we use
this thing here because it is easier to implement. */
static
gpgme_error_t
colon_line_handler
(
void
*
opaque
,
int
fd
)
{
struct
io_cb_data
*
data
=
(
struct
io_cb_data
*
)
opaque
;
engine_gpg_t
gpg
=
(
engine_gpg_t
)
data
->
handler_value
;
gpgme_error_t
rc
=
0
;
assert
(
fd
==
gpg
->
colon
.
fd
[
0
]);
rc
=
read_colon_line
(
gpg
);
if
(
rc
)
return
rc
;
if
(
gpg
->
colon
.
eof
)
_gpgme_io_close
(
fd
);
return
0
;
}
static
gpgme_error_t
start
(
engine_gpg_t
gpg
)
{
gpgme_error_t
rc
;
int
i
,
n
;
int
status
;
struct
spawn_fd_item_s
*
fd_list
;
pid_t
pid
;
const
char
*
pgmname
;
if
(
!
gpg
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
!
gpg
->
flags
.
use_gpgtar
)
pgmname
=
gpg
->
file_name
?
gpg
->
file_name
:
_gpgme_get_default_gpg_name
();
else
pgmname
=
_gpgme_get_default_gpgtar_name
();
if
(
!
pgmname
)
return
trace_gpg_error
(
GPG_ERR_INV_ENGINE
);
rc
=
gpgme_data_new
(
&
gpg
->
diagnostics
);
if
(
rc
)
return
rc
;
if
(
gpg
->
flags
.
use_gpgtar
)
{
/* Read the diagnostics output from gpgtar's stderr. */
rc
=
add_data
(
gpg
,
gpg
->
diagnostics
,
2
,
1
);
if
(
rc
)
return
rc
;
}
else
{
rc
=
add_data_ext
(
gpg
,
gpg
->
diagnostics
,
-2
,
1
,
1
);
if
(
rc
)
return
rc
;
rc
=
add_arg_ext
(
gpg
,
"--logger-fd"
,
1
);
if
(
rc
)
return
rc
;
}
if
(
!
gpg
->
flags
.
use_gpgtar
||
have_gpg_version
(
gpg
,
"2.4.1"
))
{
/* Do not pass --status-fd to gpgtar for gpg < 2.4.1. */
{
char
buf
[
25
];
_gpgme_io_fd2str
(
buf
,
sizeof
(
buf
),
gpg
->
status
.
fd
[
1
]);
rc
=
add_arg_with_locp
(
gpg
,
buf
,
&
gpg
->
status
.
arg_loc
,
1
);
if
(
rc
)
return
rc
;
}
rc
=
add_arg_ext
(
gpg
,
"--status-fd"
,
1
);
if
(
rc
)
return
rc
;
}
if
(
gpg
->
lc_ctype
)
{
rc
=
add_gpg_arg_with_value
(
gpg
,
"--lc-ctype="
,
gpg
->
lc_ctype
,
1
);
if
(
rc
)
return
rc
;
}
if
(
gpg
->
lc_messages
)
{
rc
=
add_gpg_arg_with_value
(
gpg
,
"--lc-messages="
,
gpg
->
lc_messages
,
1
);
if
(
rc
)
return
rc
;
}
rc
=
build_argv
(
gpg
,
pgmname
);
if
(
rc
)
return
rc
;
/* status_fd, colon_fd and end of list. */
n
=
3
;
for
(
i
=
0
;
gpg
->
fd_data_map
[
i
].
data
;
i
++
)
n
++
;
fd_list
=
calloc
(
n
,
sizeof
*
fd_list
);
if
(
!
fd_list
)
return
gpg_error_from_syserror
();
/* Build the fd list for the child. */
n
=
0
;
fd_list
[
n
].
fd
=
gpg
->
status
.
fd
[
1
];
fd_list
[
n
].
dup_to
=
-1
;
fd_list
[
n
].
arg_loc
=
gpg
->
status
.
arg_loc
;
n
++
;
if
(
gpg
->
colon
.
fnc
)
{
fd_list
[
n
].
fd
=
gpg
->
colon
.
fd
[
1
];
fd_list
[
n
].
dup_to
=
1
;
n
++
;
}
for
(
i
=
0
;
gpg
->
fd_data_map
[
i
].
data
;
i
++
)
{
fd_list
[
n
].
fd
=
gpg
->
fd_data_map
[
i
].
peer_fd
;
fd_list
[
n
].
dup_to
=
gpg
->
fd_data_map
[
i
].
dup_to
;
fd_list
[
n
].
arg_loc
=
gpg
->
fd_data_map
[
i
].
arg_loc
;
n
++
;
}
fd_list
[
n
].
fd
=
-1
;
fd_list
[
n
].
dup_to
=
-1
;
status
=
_gpgme_io_spawn
(
pgmname
,
gpg
->
argv
,
(
IOSPAWN_FLAG_DETACHED
|
IOSPAWN_FLAG_ALLOW_SET_FG
),
fd_list
,
NULL
,
NULL
,
&
pid
);
{
int
saved_err
=
gpg_error_from_syserror
();
free
(
fd_list
);
if
(
status
==
-1
)
return
saved_err
;
}
/*_gpgme_register_term_handler ( closure, closure_value, pid );*/
rc
=
add_io_cb
(
gpg
,
gpg
->
status
.
fd
[
0
],
1
,
status_handler
,
gpg
,
&
gpg
->
status
.
tag
);
if
(
rc
)
/* FIXME: kill the child */
return
rc
;
if
(
gpg
->
colon
.
fnc
)
{
assert
(
gpg
->
colon
.
fd
[
0
]
!=
-1
);
rc
=
add_io_cb
(
gpg
,
gpg
->
colon
.
fd
[
0
],
1
,
colon_line_handler
,
gpg
,
&
gpg
->
colon
.
tag
);
if
(
rc
)
/* FIXME: kill the child */
return
rc
;
}
for
(
i
=
0
;
gpg
->
fd_data_map
[
i
].
data
;
i
++
)
{
if
(
gpg
->
cmd
.
used
&&
i
==
gpg
->
cmd
.
idx
)
{
/* Park the cmd fd. */
gpg
->
cmd
.
fd
=
gpg
->
fd_data_map
[
i
].
fd
;
gpg
->
fd_data_map
[
i
].
fd
=
-1
;
}
else
{
rc
=
add_io_cb
(
gpg
,
gpg
->
fd_data_map
[
i
].
fd
,
gpg
->
fd_data_map
[
i
].
inbound
,
gpg
->
fd_data_map
[
i
].
inbound
?
_gpgme_data_inbound_handler
:
_gpgme_data_outbound_handler
,
gpg
->
fd_data_map
[
i
].
data
,
&
gpg
->
fd_data_map
[
i
].
tag
);
if
(
rc
)
/* FIXME: kill the child */
return
rc
;
}
}
gpg_io_event
(
gpg
,
GPGME_EVENT_START
,
NULL
);
/* fixme: check what data we can release here */
return
0
;
}
/* Add the --input-size-hint option if requested. */
static
gpgme_error_t
add_input_size_hint
(
engine_gpg_t
gpg
,
gpgme_data_t
data
)
{
gpgme_error_t
err
;
gpgme_off_t
value
=
_gpgme_data_get_size_hint
(
data
);
char
numbuf
[
50
];
/* Large enough for even 2^128 in base-10. */
char
*
p
;
if
(
!
value
||
!
have_gpg_version
(
gpg
,
"2.1.15"
))
return
0
;
err
=
add_arg
(
gpg
,
"--input-size-hint"
);
if
(
!
err
)
{
p
=
numbuf
+
sizeof
numbuf
;
*--
p
=
0
;
do
{
*--
p
=
'0'
+
(
value
%
10
);
value
/=
10
;
}
while
(
value
);
err
=
add_arg
(
gpg
,
p
);
}
return
err
;
}
static
gpgme_error_t
gpg_decrypt
(
void
*
engine
,
gpgme_decrypt_flags_t
flags
,
gpgme_data_t
ciph
,
gpgme_data_t
plain
,
int
export_session_key
,
const
char
*
override_session_key
,
int
auto_key_retrieve
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
gpg
->
flags
.
use_gpgtar
=
!!
(
flags
&
GPGME_DECRYPT_ARCHIVE
);
if
(
gpg
->
flags
.
use_gpgtar
&&
!
have_gpg_version
(
gpg
,
"2.3.5"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
(
gpg
->
flags
.
use_gpgtar
&&
(
flags
&
GPGME_DECRYPT_UNWRAP
))
return
gpg_error
(
GPG_ERR_INV_VALUE
);
err
=
add_arg
(
gpg
,
"--decrypt"
);
if
(
!
err
&&
(
flags
&
GPGME_DECRYPT_UNWRAP
))
{
if
(
!
have_gpg_version
(
gpg
,
"2.1.12"
))
err
=
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
else
err
=
add_arg
(
gpg
,
"--unwrap"
);
}
if
(
!
err
&&
export_session_key
)
err
=
add_gpg_arg
(
gpg
,
"--show-session-key"
);
if
(
!
err
&&
auto_key_retrieve
)
err
=
add_gpg_arg
(
gpg
,
"--auto-key-retrieve"
);
if
(
!
err
&&
gpg
->
flags
.
auto_key_import
)
err
=
add_gpg_arg
(
gpg
,
"--auto-key-import"
);
if
(
!
err
&&
override_session_key
&&
*
override_session_key
)
{
if
(
have_gpg_version
(
gpg
,
"2.1.16"
)
&&
!
gpg
->
flags
.
use_gpgtar
)
{
gpgme_data_release
(
gpg
->
override_session_key
);
TRACE
(
DEBUG_ENGINE
,
"override"
,
gpg
,
"seskey='%s' len=%zu
\n
"
,
override_session_key
,
strlen
(
override_session_key
));
err
=
gpgme_data_new_from_mem
(
&
gpg
->
override_session_key
,
override_session_key
,
strlen
(
override_session_key
),
1
);
if
(
!
err
)
{
/* When we are not trying to verify signatures as well,
* we add --no-keyring because a keyring is not required
* for decryption when overriding the session key. It would
* work without that option but --no-keyring avoids that
* gpg return a failure due to a missing key log_error()
* diagnostic. --no-keyring is supported since 2.1.14. */
if
(
!
(
flags
&
GPGME_DECRYPT_VERIFY
))
err
=
add_arg
(
gpg
,
"--no-keyring"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--override-session-key-fd"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
gpg
->
override_session_key
,
-2
,
0
);
}
}
else
{
/* Using that option may leak the session key via ps(1). */
err
=
add_gpg_arg_with_value
(
gpg
,
"--override-session-key="
,
override_session_key
,
0
);
}
}
/* Tell the gpg object about the data. */
if
(
gpg
->
flags
.
use_gpgtar
)
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
plain
);
if
(
!
err
&&
file_name
)
{
err
=
add_arg
(
gpg
,
"--directory"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
file_name
);
}
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
ciph
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
ciph
,
0
,
0
);
}
else
{
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--output"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
plain
,
1
,
1
);
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
ciph
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
ciph
,
-1
,
0
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_delete
(
void
*
engine
,
gpgme_key_t
key
,
unsigned
int
flags
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
=
0
;
int
allow_secret
=
flags
&
GPGME_DELETE_ALLOW_SECRET
;
int
force
=
flags
&
GPGME_DELETE_FORCE
;
if
(
force
)
err
=
add_arg
(
gpg
,
"--yes"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
allow_secret
?
"--delete-secret-and-public-key"
:
"--delete-key"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
{
if
(
!
key
->
subkeys
||
!
key
->
subkeys
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
else
err
=
add_arg
(
gpg
,
key
->
subkeys
->
fpr
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_passwd
(
void
*
engine
,
gpgme_key_t
key
,
unsigned
int
flags
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
(
void
)
flags
;
if
(
!
key
||
!
key
->
subkeys
||
!
key
->
subkeys
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_CERT_OBJ
);
err
=
add_arg
(
gpg
,
"--passwd"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
subkeys
->
fpr
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
append_args_from_signers
(
engine_gpg_t
gpg
,
gpgme_ctx_t
ctx
/* FIXME */
)
{
gpgme_error_t
err
=
0
;
int
i
;
gpgme_key_t
key
;
for
(
i
=
0
;
(
key
=
gpgme_signers_enum
(
ctx
,
i
));
i
++
)
{
const
char
*
s
=
key
->
subkeys
?
key
->
subkeys
->
keyid
:
NULL
;
if
(
s
)
{
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-u"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
s
);
}
gpgme_key_unref
(
key
);
if
(
err
)
break
;
}
return
err
;
}
static
gpgme_error_t
append_args_from_sender
(
engine_gpg_t
gpg
,
gpgme_ctx_t
ctx
)
{
gpgme_error_t
err
=
0
;
if
(
ctx
->
sender
&&
have_gpg_version
(
gpg
,
"2.1.15"
))
err
=
add_gpg_arg_with_value
(
gpg
,
"--sender="
,
ctx
->
sender
,
0
);
return
err
;
}
#define NOTATION_FLAG_SIG 1
/* Use --sig-notation (default)*/
#define NOTATION_FLAG_CERT 2
/* Use --cert-notation */
#define NOTATION_FLAG_SET 3
/* Use --set-notation */
static
gpgme_error_t
append_args_from_sig_notations
(
engine_gpg_t
gpg
,
gpgme_ctx_t
ctx
/* FIXME */
,
int
flags
)
{
gpgme_error_t
err
=
0
;
gpgme_sig_notation_t
notation
;
notation
=
gpgme_sig_notation_get
(
ctx
);
while
(
!
err
&&
notation
)
{
if
(
notation
->
name
&&
!
(
notation
->
flags
&
GPGME_SIG_NOTATION_HUMAN_READABLE
))
err
=
gpg_error
(
GPG_ERR_INV_VALUE
);
else
if
(
notation
->
name
)
{
char
*
arg
;
/* Maximum space needed is one byte for the "critical" flag,
the name, one byte for '=', the value, and a terminating
'\0'. */
arg
=
malloc
(
1
+
notation
->
name_len
+
1
+
notation
->
value_len
+
1
);
if
(
!
arg
)
err
=
gpg_error_from_syserror
();
if
(
!
err
)
{
char
*
argp
=
arg
;
if
(
notation
->
critical
)
*
(
argp
++
)
=
'!'
;
memcpy
(
argp
,
notation
->
name
,
notation
->
name_len
);
argp
+=
notation
->
name_len
;
*
(
argp
++
)
=
'='
;
/* We know that notation->name is '\0' terminated. */
strcpy
(
argp
,
notation
->
value
);
}
if
(
!
err
)
{
if
((
flags
&
NOTATION_FLAG_SET
))
err
=
add_gpg_arg_with_value
(
gpg
,
"--set-notation="
,
arg
,
0
);
else
if
((
flags
&
NOTATION_FLAG_CERT
))
err
=
add_gpg_arg_with_value
(
gpg
,
"--cert-notation="
,
arg
,
0
);
else
err
=
add_gpg_arg_with_value
(
gpg
,
"--sig-notation="
,
arg
,
0
);
}
if
(
arg
)
free
(
arg
);
}
else
{
/* This is a policy URL. */
char
*
value
;
if
(
notation
->
critical
)
{
value
=
malloc
(
1
+
notation
->
value_len
+
1
);
if
(
!
value
)
err
=
gpg_error_from_syserror
();
else
{
value
[
0
]
=
'!'
;
/* We know that notation->value is '\0' terminated. */
strcpy
(
&
value
[
1
],
notation
->
value
);
}
}
else
value
=
notation
->
value
;
if
(
!
err
)
err
=
add_gpg_arg_with_value
(
gpg
,
"--sig-policy-url="
,
value
,
0
);
if
(
value
!=
notation
->
value
)
free
(
value
);
}
notation
=
notation
->
next
;
}
return
err
;
}
static
gpgme_error_t
append_args_from_cert_expire
(
engine_gpg_t
gpg
,
gpgme_ctx_t
ctx
)
{
gpgme_error_t
err
;
if
(
ctx
->
cert_expire
)
{
/* Override ask-cert-expire set in the configuration, so that the specified
* default is actually used. */
err
=
add_arg
(
gpg
,
"--no-ask-cert-expire"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--default-cert-expire"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
ctx
->
cert_expire
);
}
else
err
=
0
;
return
err
;
}
static
gpgme_error_t
gpg_edit
(
void
*
engine
,
int
type
,
gpgme_key_t
key
,
gpgme_data_t
out
,
gpgme_ctx_t
ctx
/* FIXME */
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
err
=
add_arg
(
gpg
,
"--with-colons"
);
if
(
!
err
&&
ctx
->
extended_edit
)
err
=
add_arg
(
gpg
,
"--expert"
);
if
(
!
err
)
err
=
append_args_from_signers
(
gpg
,
ctx
);
if
(
!
err
)
err
=
append_args_from_sig_notations
(
gpg
,
ctx
,
NOTATION_FLAG_CERT
);
if
(
!
err
)
err
=
append_args_from_cert_expire
(
gpg
,
ctx
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
type
==
0
?
"--edit-key"
:
"--card-edit"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
out
,
1
,
1
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
&&
type
==
0
)
{
const
char
*
s
=
key
->
subkeys
?
key
->
subkeys
->
fpr
:
NULL
;
if
(
!
s
)
err
=
gpg_error
(
GPG_ERR_INV_VALUE
);
else
err
=
add_arg
(
gpg
,
s
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
/* Add a single argument from a key to an -r option. */
static
gpg_error_t
add_arg_recipient
(
engine_gpg_t
gpg
,
gpgme_encrypt_flags_t
flags
,
gpgme_key_t
key
)
{
gpg_error_t
err
;
if
((
flags
&
GPGME_ENCRYPT_WANT_ADDRESS
))
{
/* We have no way to figure out which mail address was
* requested. FIXME: It would be possible to figure this out by
* consulting the SENDER property of the context. */
err
=
gpg_error
(
GPG_ERR_INV_USER_ID
);
}
else
err
=
add_arg
(
gpg
,
key
->
subkeys
->
fpr
);
return
err
;
}
/* Add a single argument from a USERID string to an -r option. */
static
gpg_error_t
add_arg_recipient_string
(
engine_gpg_t
gpg
,
gpgme_encrypt_flags_t
flags
,
const
char
*
userid
,
int
useridlen
)
{
gpg_error_t
err
;
if
((
flags
&
GPGME_ENCRYPT_WANT_ADDRESS
))
{
char
*
tmpstr
,
*
mbox
;
tmpstr
=
malloc
(
useridlen
+
1
);
if
(
!
tmpstr
)
err
=
gpg_error_from_syserror
();
else
{
memcpy
(
tmpstr
,
userid
,
useridlen
);
tmpstr
[
useridlen
]
=
0
;
mbox
=
_gpgme_mailbox_from_userid
(
tmpstr
);
if
(
!
mbox
)
{
err
=
gpg_error_from_syserror
();
if
(
gpg_err_code
(
err
)
==
GPG_ERR_EINVAL
)
err
=
gpg_error
(
GPG_ERR_INV_USER_ID
);
}
else
err
=
add_arg
(
gpg
,
mbox
);
free
(
mbox
);
free
(
tmpstr
);
}
}
else
err
=
add_arg_len
(
gpg
,
NULL
,
userid
,
useridlen
);
return
err
;
}
static
gpgme_error_t
append_args_from_recipients
(
engine_gpg_t
gpg
,
gpgme_encrypt_flags_t
flags
,
gpgme_key_t
recp
[])
{
gpgme_error_t
err
=
0
;
int
i
=
0
;
while
(
recp
[
i
])
{
if
(
!
recp
[
i
]
->
subkeys
||
!
recp
[
i
]
->
subkeys
->
fpr
)
err
=
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-r"
);
if
(
!
err
)
err
=
add_arg_recipient
(
gpg
,
flags
,
recp
[
i
]);
if
(
err
)
break
;
i
++
;
}
return
err
;
}
/* Take recipients from the LF delimited STRING and add -r args. */
static
gpg_error_t
append_args_from_recipients_string
(
engine_gpg_t
gpg
,
gpgme_encrypt_flags_t
flags
,
const
char
*
string
)
{
gpg_error_t
err
=
0
;
gpgme_encrypt_flags_t
orig_flags
=
flags
;
int
any
=
0
;
int
ignore
=
0
;
int
hidden
=
0
;
int
file
=
0
;
const
char
*
s
;
int
n
;
do
{
/* Skip leading white space */
while
(
*
string
==
' '
||
*
string
==
'\t'
)
string
++
;
if
(
!*
string
)
break
;
/* Look for the LF. */
s
=
strchr
(
string
,
'\n'
);
if
(
s
)
n
=
s
-
string
;
else
n
=
strlen
(
string
);
while
(
n
&&
(
string
[
n
-1
]
==
' '
||
string
[
n
-1
]
==
'\t'
))
n
--
;
if
(
!
ignore
&&
n
==
2
&&
!
memcmp
(
string
,
"--"
,
2
))
ignore
=
1
;
else
if
(
!
ignore
&&
n
==
8
&&
!
memcmp
(
string
,
"--hidden"
,
8
))
hidden
=
1
;
else
if
(
!
ignore
&&
n
==
11
&&
!
memcmp
(
string
,
"--no-hidden"
,
11
))
hidden
=
0
;
else
if
(
!
ignore
&&
n
==
6
&&
!
memcmp
(
string
,
"--file"
,
6
))
{
file
=
1
;
/* Because the key is used as is we need to ignore this flag: */
flags
&=
~
GPGME_ENCRYPT_WANT_ADDRESS
;
}
else
if
(
!
ignore
&&
n
==
9
&&
!
memcmp
(
string
,
"--no-file"
,
9
))
{
file
=
0
;
flags
=
orig_flags
;
}
else
if
(
!
ignore
&&
n
>
2
&&
!
memcmp
(
string
,
"--"
,
2
))
err
=
gpg_error
(
GPG_ERR_UNKNOWN_OPTION
);
else
if
(
n
)
/* Not empty - use it. */
{
err
=
add_arg
(
gpg
,
file
?
(
hidden
?
"-F"
:
"-f"
)
:
(
hidden
?
"-R"
:
"-r"
));
if
(
!
err
)
err
=
add_arg_recipient_string
(
gpg
,
flags
,
string
,
n
);
if
(
!
err
)
any
=
1
;
}
string
+=
n
+
!!
s
;
}
while
(
!
err
);
if
(
!
err
&&
!
any
)
err
=
gpg_error
(
GPG_ERR_MISSING_KEY
);
return
err
;
}
static
gpgme_error_t
gpg_encrypt
(
void
*
engine
,
gpgme_key_t
recp
[],
const
char
*
recpstring
,
gpgme_encrypt_flags_t
flags
,
gpgme_data_t
plain
,
gpgme_data_t
ciph
,
int
use_armor
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
=
0
;
gpg
->
flags
.
use_gpgtar
=
!!
(
flags
&
GPGME_ENCRYPT_ARCHIVE
);
if
(
gpg
->
flags
.
use_gpgtar
&&
!
have_gpg_version
(
gpg
,
"2.3.5"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
(
gpg
->
flags
.
use_gpgtar
&&
(
flags
&
GPGME_ENCRYPT_WRAP
))
return
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
recp
||
recpstring
)
err
=
add_arg
(
gpg
,
"--encrypt"
);
if
(
!
err
&&
((
flags
&
GPGME_ENCRYPT_SYMMETRIC
)
||
(
!
recp
&&
!
recpstring
)))
err
=
add_arg
(
gpg
,
"--symmetric"
);
if
(
!
err
&&
use_armor
)
err
=
add_gpg_arg
(
gpg
,
"--armor"
);
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_WRAP
))
{
/* gpg is current not able to detect already compressed
* packets. Thus when using
* gpg --unwrap -d | gpg --no-literal -e
* the encryption would add an additional compression layer.
* We better suppress that. */
flags
|=
GPGME_ENCRYPT_NO_COMPRESS
;
err
=
add_gpg_arg
(
gpg
,
"--no-literal"
);
}
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_NO_COMPRESS
))
err
=
add_gpg_arg
(
gpg
,
"--compress-algo=none"
);
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_THROW_KEYIDS
))
err
=
add_gpg_arg
(
gpg
,
"--throw-keyids"
);
if
(
gpgme_data_get_encoding
(
plain
)
==
GPGME_DATA_ENCODING_MIME
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
err
=
add_gpg_arg
(
gpg
,
"--mimemode"
);
if
(
!
err
&&
gpg
->
flags
.
include_key_block
)
err
=
add_gpg_arg
(
gpg
,
"--include-key-block"
);
if
(
recp
||
recpstring
)
{
/* If we know that all recipients are valid (full or ultimate trust)
we can suppress further checks. */
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_ALWAYS_TRUST
))
err
=
add_gpg_arg
(
gpg
,
"--always-trust"
);
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_NO_ENCRYPT_TO
))
err
=
add_gpg_arg
(
gpg
,
"--no-encrypt-to"
);
if
(
!
err
&&
!
recp
&&
recpstring
)
err
=
append_args_from_recipients_string
(
gpg
,
flags
,
recpstring
);
else
if
(
!
err
)
err
=
append_args_from_recipients
(
gpg
,
flags
,
recp
);
}
/* Tell the gpg object about the data. */
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--output"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
ciph
,
1
,
1
);
if
(
gpg
->
flags
.
use_gpgtar
)
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
plain
);
if
(
!
err
&&
file_name
)
{
err
=
add_arg
(
gpg
,
"--directory"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
file_name
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--files-from"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--null"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--utf8-strings"
);
/* Pass the filenames to gpgtar's stdin. */
if
(
!
err
)
err
=
add_data
(
gpg
,
plain
,
0
,
0
);
}
else
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
plain
);
if
(
!
err
&&
file_name
)
err
=
add_gpg_arg_with_value
(
gpg
,
"--set-filename="
,
file_name
,
0
);
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
plain
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
plain
,
-1
,
0
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_encrypt_sign
(
void
*
engine
,
gpgme_key_t
recp
[],
const
char
*
recpstring
,
gpgme_encrypt_flags_t
flags
,
gpgme_data_t
plain
,
gpgme_data_t
ciph
,
int
use_armor
,
gpgme_ctx_t
ctx
/* FIXME */
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
=
0
;
gpg
->
flags
.
use_gpgtar
=
!!
(
flags
&
GPGME_ENCRYPT_ARCHIVE
);
if
(
gpg
->
flags
.
use_gpgtar
&&
!
have_gpg_version
(
gpg
,
"2.3.5"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
(
recp
||
recpstring
)
err
=
add_arg
(
gpg
,
"--encrypt"
);
if
(
!
err
&&
((
flags
&
GPGME_ENCRYPT_SYMMETRIC
)
||
(
!
recp
&&
!
recpstring
)))
err
=
add_arg
(
gpg
,
"--symmetric"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--sign"
);
if
(
!
err
&&
use_armor
)
err
=
add_gpg_arg
(
gpg
,
"--armor"
);
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_NO_COMPRESS
))
err
=
add_gpg_arg
(
gpg
,
"--compress-algo=none"
);
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_THROW_KEYIDS
))
err
=
add_gpg_arg
(
gpg
,
"--throw-keyids"
);
if
(
gpgme_data_get_encoding
(
plain
)
==
GPGME_DATA_ENCODING_MIME
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
err
=
add_gpg_arg
(
gpg
,
"--mimemode"
);
if
(
!
err
&&
gpg
->
flags
.
include_key_block
)
err
=
add_gpg_arg
(
gpg
,
"--include-key-block"
);
if
(
recp
||
recpstring
)
{
/* If we know that all recipients are valid (full or ultimate trust)
we can suppress further checks. */
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_ALWAYS_TRUST
))
err
=
add_gpg_arg
(
gpg
,
"--always-trust"
);
if
(
!
err
&&
(
flags
&
GPGME_ENCRYPT_NO_ENCRYPT_TO
))
err
=
add_gpg_arg
(
gpg
,
"--no-encrypt-to"
);
if
(
!
err
&&
!
recp
&&
recpstring
)
err
=
append_args_from_recipients_string
(
gpg
,
flags
,
recpstring
);
else
if
(
!
err
)
err
=
append_args_from_recipients
(
gpg
,
flags
,
recp
);
}
if
(
!
err
)
err
=
append_args_from_signers
(
gpg
,
ctx
);
if
(
!
err
)
err
=
append_args_from_sender
(
gpg
,
ctx
);
if
(
!
err
)
err
=
append_args_from_sig_notations
(
gpg
,
ctx
,
NOTATION_FLAG_SIG
);
/* Tell the gpg object about the data. */
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--output"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
ciph
,
1
,
1
);
if
(
gpg
->
flags
.
use_gpgtar
)
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
plain
);
if
(
!
err
&&
file_name
)
{
err
=
add_arg
(
gpg
,
"--directory"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
file_name
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--files-from"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--null"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--utf8-strings"
);
/* Pass the filenames to gpgtar's stdin. */
if
(
!
err
)
err
=
add_data
(
gpg
,
plain
,
0
,
0
);
}
else
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
plain
);
if
(
!
err
&&
file_name
)
err
=
add_gpg_arg_with_value
(
gpg
,
"--set-filename="
,
file_name
,
0
);
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
plain
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
plain
,
-1
,
0
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
export_common
(
engine_gpg_t
gpg
,
gpgme_export_mode_t
mode
,
gpgme_data_t
keydata
,
int
use_armor
)
{
gpgme_error_t
err
=
0
;
if
((
mode
&
~
(
GPGME_EXPORT_MODE_EXTERN
|
GPGME_EXPORT_MODE_MINIMAL
|
GPGME_EXPORT_MODE_SSH
|
GPGME_EXPORT_MODE_SECRET
|
GPGME_EXPORT_MODE_SECRET_SUBKEY
)))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
((
mode
&
GPGME_EXPORT_MODE_MINIMAL
))
{
err
=
add_arg
(
gpg
,
"--export-options=export-minimal"
);
}
if
(
err
)
;
else
if
((
mode
&
GPGME_EXPORT_MODE_SSH
))
{
if
(
have_gpg_version
(
gpg
,
"2.1.11"
))
err
=
add_arg
(
gpg
,
"--export-ssh-key"
);
else
err
=
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
(
!
err
)
err
=
add_data
(
gpg
,
keydata
,
1
,
1
);
}
else
if
((
mode
&
GPGME_EXPORT_MODE_EXTERN
))
{
err
=
add_arg
(
gpg
,
"--send-keys"
);
}
else
{
if
((
mode
&
GPGME_EXPORT_MODE_SECRET_SUBKEY
))
err
=
add_arg
(
gpg
,
"--export-secret-subkeys"
);
else
if
((
mode
&
GPGME_EXPORT_MODE_SECRET
))
err
=
add_arg
(
gpg
,
"--export-secret-keys"
);
else
err
=
add_arg
(
gpg
,
"--export"
);
if
(
!
err
&&
use_armor
)
err
=
add_arg
(
gpg
,
"--armor"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
keydata
,
1
,
1
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
return
err
;
}
static
gpgme_error_t
gpg_export
(
void
*
engine
,
const
char
*
pattern
,
gpgme_export_mode_t
mode
,
gpgme_data_t
keydata
,
int
use_armor
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
err
=
export_common
(
gpg
,
mode
,
keydata
,
use_armor
);
if
(
!
err
&&
pattern
&&
*
pattern
)
err
=
add_arg
(
gpg
,
pattern
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_export_ext
(
void
*
engine
,
const
char
*
pattern
[],
gpgme_export_mode_t
mode
,
gpgme_data_t
keydata
,
int
use_armor
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
err
=
export_common
(
gpg
,
mode
,
keydata
,
use_armor
);
if
(
pattern
)
{
while
(
!
err
&&
*
pattern
&&
**
pattern
)
err
=
add_arg
(
gpg
,
*
(
pattern
++
));
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
/* Helper to add algo, usage, and expire to the list of args. */
static
gpgme_error_t
gpg_add_algo_usage_expire
(
engine_gpg_t
gpg
,
const
char
*
algo
,
unsigned
long
expires
,
unsigned
int
flags
)
{
gpg_error_t
err
;
/* This condition is only required to allow the use of gpg < 2.1.16 */
if
(
algo
||
(
flags
&
(
GPGME_CREATE_SIGN
|
GPGME_CREATE_ENCR
|
GPGME_CREATE_CERT
|
GPGME_CREATE_AUTH
|
GPGME_CREATE_NOEXPIRE
))
||
expires
)
{
err
=
add_arg
(
gpg
,
algo
?
algo
:
"default"
);
if
(
!
err
)
{
char
tmpbuf
[
5
*
4
+
1
];
snprintf
(
tmpbuf
,
sizeof
tmpbuf
,
"%s%s%s%s"
,
(
flags
&
GPGME_CREATE_SIGN
)
?
" sign"
:
""
,
(
flags
&
GPGME_CREATE_ENCR
)
?
" encr"
:
""
,
(
flags
&
GPGME_CREATE_CERT
)
?
" cert"
:
""
,
(
flags
&
GPGME_CREATE_AUTH
)
?
" auth"
:
""
);
err
=
add_arg
(
gpg
,
*
tmpbuf
?
tmpbuf
:
"default"
);
}
if
(
!
err
)
{
if
((
flags
&
GPGME_CREATE_NOEXPIRE
))
err
=
add_arg
(
gpg
,
"never"
);
else
if
(
expires
==
0
)
err
=
add_arg
(
gpg
,
"-"
);
else
{
char
tmpbuf
[
8
+
20
];
snprintf
(
tmpbuf
,
sizeof
tmpbuf
,
"seconds=%lu"
,
expires
);
err
=
add_arg
(
gpg
,
tmpbuf
);
}
}
}
else
err
=
0
;
return
err
;
}
static
gpgme_error_t
gpg_createkey_from_param
(
engine_gpg_t
gpg
,
gpgme_data_t
help_data
,
unsigned
int
extraflags
)
{
gpgme_error_t
err
;
err
=
add_arg
(
gpg
,
"--gen-key"
);
if
(
!
err
&&
(
extraflags
&
GENKEY_EXTRAFLAG_ARMOR
))
err
=
add_arg
(
gpg
,
"--armor"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
help_data
,
-1
,
0
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_createkey
(
engine_gpg_t
gpg
,
const
char
*
userid
,
const
char
*
algo
,
unsigned
long
expires
,
unsigned
int
flags
,
unsigned
int
extraflags
)
{
gpgme_error_t
err
;
err
=
add_arg
(
gpg
,
"--quick-gen-key"
);
if
(
!
err
&&
(
extraflags
&
GENKEY_EXTRAFLAG_ARMOR
))
err
=
add_arg
(
gpg
,
"--armor"
);
if
(
!
err
&&
(
flags
&
GPGME_CREATE_NOPASSWD
))
{
err
=
add_arg
(
gpg
,
"--passphrase"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
""
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--batch"
);
}
if
(
!
err
&&
(
flags
&
GPGME_CREATE_FORCE
))
err
=
add_arg
(
gpg
,
"--yes"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
userid
);
if
(
!
err
)
err
=
gpg_add_algo_usage_expire
(
gpg
,
algo
,
expires
,
flags
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_addkey
(
engine_gpg_t
gpg
,
const
char
*
algo
,
unsigned
long
expires
,
gpgme_key_t
key
,
unsigned
int
flags
,
unsigned
int
extraflags
)
{
gpgme_error_t
err
;
if
(
!
key
||
!
key
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_ARG
);
err
=
add_arg
(
gpg
,
"--quick-addkey"
);
if
(
!
err
&&
(
extraflags
&
GENKEY_EXTRAFLAG_ARMOR
))
err
=
add_arg
(
gpg
,
"--armor"
);
if
(
!
err
&&
(
flags
&
GPGME_CREATE_NOPASSWD
))
{
err
=
add_arg
(
gpg
,
"--passphrase"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
""
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--batch"
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
fpr
);
if
(
!
err
)
err
=
gpg_add_algo_usage_expire
(
gpg
,
algo
,
expires
,
flags
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_adduid
(
engine_gpg_t
gpg
,
gpgme_key_t
key
,
const
char
*
userid
,
unsigned
int
extraflags
)
{
gpgme_error_t
err
;
if
(
!
key
||
!
key
->
fpr
||
!
userid
)
return
gpg_error
(
GPG_ERR_INV_ARG
);
if
((
extraflags
&
GENKEY_EXTRAFLAG_SETPRIMARY
))
{
if
(
!
have_gpg_version
(
gpg
,
"2.1.20"
))
err
=
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
else
err
=
add_arg
(
gpg
,
"--quick-set-primary-uid"
);
}
else
if
((
extraflags
&
GENKEY_EXTRAFLAG_REVOKE
))
err
=
add_arg
(
gpg
,
"--quick-revuid"
);
else
err
=
add_arg
(
gpg
,
"--quick-adduid"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
fpr
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
userid
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_genkey
(
void
*
engine
,
const
char
*
userid
,
const
char
*
algo
,
unsigned
long
reserved
,
unsigned
long
expires
,
gpgme_key_t
key
,
unsigned
int
flags
,
gpgme_data_t
help_data
,
unsigned
int
extraflags
,
gpgme_data_t
pubkey
,
gpgme_data_t
seckey
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
(
void
)
reserved
;
if
(
!
gpg
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
/* If HELP_DATA is given the use of the old interface
* (gpgme_op_genkey) has been requested. The other modes are:
*
* USERID && !KEY - Create a new keyblock.
* !USERID && KEY - Add a new subkey to KEY (gpg >= 2.1.14)
* USERID && KEY && !ALGO - Add a new user id to KEY (gpg >= 2.1.14).
* or set a flag on a user id.
*/
if
(
help_data
)
{
/* We need a special mechanism to get the fd of a pipe here, so
that we can use this for the %pubring and %secring
parameters. We don't have this yet, so we implement only the
adding to the standard keyrings. */
if
(
pubkey
||
seckey
)
err
=
gpg_error
(
GPG_ERR_NOT_IMPLEMENTED
);
else
err
=
gpg_createkey_from_param
(
gpg
,
help_data
,
extraflags
);
}
else
if
(
!
have_gpg_version
(
gpg
,
"2.1.13"
))
err
=
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
else
if
(
userid
&&
!
key
)
err
=
gpg_createkey
(
gpg
,
userid
,
algo
,
expires
,
flags
,
extraflags
);
else
if
(
!
userid
&&
key
)
err
=
gpg_addkey
(
gpg
,
algo
,
expires
,
key
,
flags
,
extraflags
);
else
if
(
userid
&&
key
&&
!
algo
)
err
=
gpg_adduid
(
gpg
,
key
,
userid
,
extraflags
);
else
err
=
gpg_error
(
GPG_ERR_INV_VALUE
);
return
err
;
}
/* Return the next DELIM delimited string from DATA as a C-string.
The caller needs to provide the address of a pointer variable which
he has to set to NULL before the first call. After the last call
to this function, this function needs to be called once more with
DATA set to NULL so that the function can release its internal
state. After that the pointer variable is free for use again.
Note that we use a delimiter and thus a trailing delimiter is not
required. DELIM may not be changed after the first call. */
static
const
char
*
string_from_data
(
gpgme_data_t
data
,
int
delim
,
void
**
helpptr
,
gpgme_error_t
*
r_err
)
{
#define MYBUFLEN 2000
/* Fixme: We don't support URLs longer than that. */
struct
{
int
eof_seen
;
int
nbytes
;
/* Length of the last returned string including
the delimiter. */
int
buflen
;
/* Valid length of BUF. */
char
buf
[
MYBUFLEN
+
1
];
/* Buffer with one byte extra space. */
}
*
self
;
char
*
p
;
int
nread
;
*
r_err
=
0
;
if
(
!
data
)
{
if
(
*
helpptr
)
{
free
(
*
helpptr
);
*
helpptr
=
NULL
;
}
return
NULL
;
}
if
(
*
helpptr
)
self
=
*
helpptr
;
else
{
self
=
malloc
(
sizeof
*
self
);
if
(
!
self
)
{
*
r_err
=
gpg_error_from_syserror
();
return
NULL
;
}
*
helpptr
=
self
;
self
->
eof_seen
=
0
;
self
->
nbytes
=
0
;
self
->
buflen
=
0
;
}
if
(
self
->
eof_seen
)
return
NULL
;
assert
(
self
->
nbytes
<=
self
->
buflen
);
memmove
(
self
->
buf
,
self
->
buf
+
self
->
nbytes
,
self
->
buflen
-
self
->
nbytes
);
self
->
buflen
-=
self
->
nbytes
;
self
->
nbytes
=
0
;
do
{
/* Fixme: This is fairly infective scanning because we may scan
the buffer several times. */
p
=
memchr
(
self
->
buf
,
delim
,
self
->
buflen
);
if
(
p
)
{
*
p
=
0
;
self
->
nbytes
=
p
-
self
->
buf
+
1
;
return
self
->
buf
;
}
if
(
!
(
MYBUFLEN
-
self
->
buflen
)
)
{
/* Not enough space - URL too long. */
*
r_err
=
gpg_error
(
GPG_ERR_TOO_LARGE
);
return
NULL
;
}
nread
=
gpgme_data_read
(
data
,
self
->
buf
+
self
->
buflen
,
MYBUFLEN
-
self
->
buflen
);
if
(
nread
<
0
)
{
*
r_err
=
gpg_error_from_syserror
();
return
NULL
;
}
self
->
buflen
+=
nread
;
}
while
(
nread
);
/* EOF reached. If we have anything in the buffer, append a Nul and
return it. */
self
->
eof_seen
=
1
;
if
(
self
->
buflen
)
{
self
->
buf
[
self
->
buflen
]
=
0
;
/* (we allocated one extra byte) */
return
self
->
buf
;
}
return
NULL
;
#undef MYBUFLEN
}
static
gpgme_error_t
gpg_import
(
void
*
engine
,
gpgme_data_t
keydata
,
gpgme_key_t
*
keyarray
,
const
char
*
keyids
[],
const
char
*
import_filter
,
const
char
*
key_origin
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
int
idx
;
gpgme_data_encoding_t
dataenc
;
if
((
keydata
&&
keyarray
)
||
(
keydata
&&
keyids
)
||
(
keyarray
&&
keyids
))
return
gpg_error
(
GPG_ERR_INV_VALUE
);
/* Only one is allowed. */
dataenc
=
gpgme_data_get_encoding
(
keydata
);
if
(
keyids
)
{
err
=
add_arg
(
gpg
,
"--recv-keys"
);
if
(
!
err
&&
import_filter
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
{
err
=
add_arg
(
gpg
,
"--import-filter"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
import_filter
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
while
(
!
err
&&
*
keyids
&&
**
keyids
)
err
=
add_arg
(
gpg
,
*
(
keyids
++
));
}
else
if
(
keyarray
)
{
err
=
add_arg
(
gpg
,
"--recv-keys"
);
if
(
!
err
&&
import_filter
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
{
err
=
add_arg
(
gpg
,
"--import-filter"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
import_filter
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
for
(
idx
=
0
;
!
err
&&
keyarray
[
idx
];
idx
++
)
{
if
(
keyarray
[
idx
]
->
protocol
!=
GPGME_PROTOCOL_OpenPGP
)
;
else
if
(
!
keyarray
[
idx
]
->
subkeys
)
;
else
if
(
keyarray
[
idx
]
->
subkeys
->
fpr
&&
*
keyarray
[
idx
]
->
subkeys
->
fpr
)
err
=
add_arg
(
gpg
,
keyarray
[
idx
]
->
subkeys
->
fpr
);
else
if
(
*
keyarray
[
idx
]
->
subkeys
->
keyid
)
err
=
add_arg
(
gpg
,
keyarray
[
idx
]
->
subkeys
->
keyid
);
}
}
else
if
(
dataenc
==
GPGME_DATA_ENCODING_URL
||
dataenc
==
GPGME_DATA_ENCODING_URL0
)
{
void
*
helpptr
;
const
char
*
string
;
gpgme_error_t
xerr
;
int
delim
=
(
dataenc
==
GPGME_DATA_ENCODING_URL
)
?
'\n'
:
0
;
/* FIXME: --fetch-keys is probably not correct because it can't
grok all kinds of URLs. On Unix it should just work but on
Windows we will build the command line and that may fail for
some embedded control characters. It is anyway limited to
the maximum size of the command line. We need another
command which can take its input from a file. Maybe we
should use an option to gpg to modify such commands (ala
--multifile). */
err
=
add_arg
(
gpg
,
"--fetch-keys"
);
if
(
!
err
&&
import_filter
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
{
err
=
add_arg
(
gpg
,
"--import-filter"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
import_filter
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
helpptr
=
NULL
;
while
(
!
err
&&
(
string
=
string_from_data
(
keydata
,
delim
,
&
helpptr
,
&
xerr
)))
err
=
add_arg
(
gpg
,
string
);
if
(
!
err
)
err
=
xerr
;
string_from_data
(
NULL
,
delim
,
&
helpptr
,
&
xerr
);
}
else
if
(
dataenc
==
GPGME_DATA_ENCODING_URLESC
)
{
/* Already escaped URLs are not yet supported. */
err
=
gpg_error
(
GPG_ERR_NOT_IMPLEMENTED
);
}
else
{
err
=
add_arg
(
gpg
,
"--import"
);
if
(
!
err
&&
import_filter
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
{
err
=
add_arg
(
gpg
,
"--import-filter"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
import_filter
);
}
if
(
!
err
&&
key_origin
&&
have_gpg_version
(
gpg
,
"2.1.22"
))
{
err
=
add_arg
(
gpg
,
"--key-origin"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key_origin
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
keydata
,
-1
,
0
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
/* The output for external keylistings in GnuPG is different from all
the other key listings. We catch this here with a special
preprocessor that reformats the colon handler lines. */
static
gpgme_error_t
gpg_keylist_preprocess
(
char
*
line
,
char
**
r_line
)
{
enum
{
RT_NONE
,
RT_INFO
,
RT_PUB
,
RT_UID
}
rectype
=
RT_NONE
;
#define NR_FIELDS 16
char
*
field
[
NR_FIELDS
];
int
fields
=
0
;
size_t
n
;
*
r_line
=
NULL
;
while
(
line
&&
fields
<
NR_FIELDS
)
{
field
[
fields
++
]
=
line
;
line
=
strchr
(
line
,
':'
);
if
(
line
)
*
(
line
++
)
=
'\0'
;
}
if
(
!
strcmp
(
field
[
0
],
"info"
))
rectype
=
RT_INFO
;
else
if
(
!
strcmp
(
field
[
0
],
"pub"
))
rectype
=
RT_PUB
;
else
if
(
!
strcmp
(
field
[
0
],
"uid"
))
rectype
=
RT_UID
;
else
rectype
=
RT_NONE
;
switch
(
rectype
)
{
case
RT_INFO
:
/* FIXME: Eventually, check the version number at least. */
return
0
;
case
RT_PUB
:
if
(
fields
<
7
)
return
0
;
/* The format is:
pub:<keyid>:<algo>:<keylen>:<creationdate>:<expirationdate>:<flags>
as defined in 5.2. Machine Readable Indexes of the OpenPGP
HTTP Keyserver Protocol (draft). Modern versions of the SKS
keyserver return the fingerprint instead of the keyid. We
detect this here and use the v4 fingerprint format to convert
it to a key id.
We want:
pub:o<flags>:<keylen>:<algo>:<keyid>:<creatdate>:<expdate>::::::::
*/
n
=
strlen
(
field
[
1
]);
if
(
n
>
16
)
{
if
(
gpgrt_asprintf
(
r_line
,
"pub:o%s:%s:%s:%s:%s:%s::::::::
\n
"
"fpr:::::::::%s:"
,
field
[
6
],
field
[
3
],
field
[
2
],
field
[
1
]
+
n
-
16
,
field
[
4
],
field
[
5
],
field
[
1
])
<
0
)
return
gpg_error_from_syserror
();
}
else
{
if
(
gpgrt_asprintf
(
r_line
,
"pub:o%s:%s:%s:%s:%s:%s::::::::"
,
field
[
6
],
field
[
3
],
field
[
2
],
field
[
1
],
field
[
4
],
field
[
5
])
<
0
)
return
gpg_error_from_syserror
();
}
return
0
;
case
RT_UID
:
/* The format is:
uid:<escaped uid string>:<creationdate>:<expirationdate>:<flags>
as defined in 5.2. Machine Readable Indexes of the OpenPGP
HTTP Keyserver Protocol (draft).
For an ldap keyserver the format is:
uid:<escaped uid string>
We want:
uid:o<flags>::::<creatdate>:<expdate>:::<c-coded uid>:
*/
{
/* The user ID is percent escaped, but we want c-coded.
Because we have to replace each '%HL' by '\xHL', we need at
most 4/3 th the number of bytes. But because we also need
to escape the backslashes we allocate twice as much. */
char
*
uid
=
malloc
(
2
*
strlen
(
field
[
1
])
+
1
);
char
*
src
;
char
*
dst
;
if
(
!
uid
)
return
gpg_error_from_syserror
();
src
=
field
[
1
];
dst
=
uid
;
while
(
*
src
)
{
if
(
*
src
==
'%'
)
{
*
(
dst
++
)
=
'\\'
;
*
(
dst
++
)
=
'x'
;
src
++
;
/* Copy the next two bytes unconditionally. */
if
(
*
src
)
*
(
dst
++
)
=
*
(
src
++
);
if
(
*
src
)
*
(
dst
++
)
=
*
(
src
++
);
}
else
if
(
*
src
==
'\\'
)
{
*
dst
++
=
'\\'
;
*
dst
++
=
'\\'
;
src
++
;
}
else
*
(
dst
++
)
=
*
(
src
++
);
}
*
dst
=
'\0'
;
if
(
fields
<
4
)
{
if
(
gpgrt_asprintf
(
r_line
,
"uid:o::::::::%s:"
,
uid
)
<
0
)
return
gpg_error_from_syserror
();
}
else
{
if
(
gpgrt_asprintf
(
r_line
,
"uid:o%s::::%s:%s:::%s:"
,
field
[
4
],
field
[
2
],
field
[
3
],
uid
)
<
0
)
return
gpg_error_from_syserror
();
}
}
return
0
;
case
RT_NONE
:
/* Unknown record. */
break
;
}
return
0
;
}
static
gpg_error_t
gpg_keylist_build_options
(
engine_gpg_t
gpg
,
int
secret_only
,
gpgme_keylist_mode_t
mode
)
{
gpg_error_t
err
;
err
=
add_arg
(
gpg
,
"--with-colons"
);
/* Since gpg 2.1.15 fingerprints are always printed, thus there is
* no more need to explicitly request them. */
if
(
!
have_gpg_version
(
gpg
,
"2.1.15"
))
{
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--fixed-list-mode"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--with-fingerprint"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--with-fingerprint"
);
}
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_WITH_TOFU
)
&&
have_gpg_version
(
gpg
,
"2.1.16"
))
err
=
add_arg
(
gpg
,
"--with-tofu-info"
);
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_WITH_SECRET
))
{
err
=
add_arg
(
gpg
,
"--with-secret"
);
err
=
add_arg
(
gpg
,
"--with-keygrip"
);
}
else
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_WITH_KEYGRIP
))
{
/* Explicitly requests the keygrip. */
err
=
add_arg
(
gpg
,
"--with-keygrip"
);
}
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_SIGS
)
&&
have_gpg_version
(
gpg
,
"2.0.10"
))
{
err
=
add_arg
(
gpg
,
"--with-sig-check"
);
}
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_SIGS
)
&&
(
mode
&
GPGME_KEYLIST_MODE_SIG_NOTATIONS
))
{
err
=
add_arg
(
gpg
,
"--list-options"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"show-sig-subpackets=
\"
20,26
\"
"
);
}
if
(
!
err
)
{
if
(
(
mode
&
GPGME_KEYLIST_MODE_EXTERN
)
)
{
if
(
secret_only
)
err
=
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
else
if
(
(
mode
&
GPGME_KEYLIST_MODE_LOCAL
))
{
/* The local+extern mode is special. It works only with
gpg >= 2.0.10. FIXME: We should check that we have
such a version to that we can return a proper error
code. The problem is that we don't know the context
here and thus can't access the cached version number
for the engine info structure. */
if
((
mode
&
GPGME_KEYLIST_MODE_FORCE_EXTERN
))
err
=
add_arg
(
gpg
,
"--locate-external-keys"
);
else
err
=
add_arg
(
gpg
,
"--locate-keys"
);
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_SIGS
))
err
=
add_arg
(
gpg
,
"--with-sig-check"
);
}
else
{
err
=
add_arg
(
gpg
,
"--search-keys"
);
gpg
->
colon
.
preprocess_fnc
=
gpg_keylist_preprocess
;
}
}
else
{
err
=
add_arg
(
gpg
,
secret_only
?
"--list-secret-keys"
:
((
mode
&
GPGME_KEYLIST_MODE_SIGS
)
?
"--check-sigs"
:
"--list-keys"
));
}
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
return
err
;
}
static
gpgme_error_t
gpg_keylist
(
void
*
engine
,
const
char
*
pattern
,
int
secret_only
,
gpgme_keylist_mode_t
mode
,
int
engine_flags
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
(
void
)
engine_flags
;
err
=
gpg_keylist_build_options
(
gpg
,
secret_only
,
mode
);
if
(
!
err
&&
pattern
&&
*
pattern
)
err
=
add_arg
(
gpg
,
pattern
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_keylist_ext
(
void
*
engine
,
const
char
*
pattern
[],
int
secret_only
,
int
reserved
,
gpgme_keylist_mode_t
mode
,
int
engine_flags
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
(
void
)
engine_flags
;
if
(
reserved
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
err
=
gpg_keylist_build_options
(
gpg
,
secret_only
,
mode
);
if
(
pattern
)
{
while
(
!
err
&&
*
pattern
&&
**
pattern
)
err
=
add_arg
(
gpg
,
*
(
pattern
++
));
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_keylist_data
(
void
*
engine
,
gpgme_keylist_mode_t
mode
,
gpgme_data_t
data
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
if
(
!
have_gpg_version
(
gpg
,
"2.1.14"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
err
=
add_arg
(
gpg
,
"--with-colons"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--with-fingerprint"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--import-options"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"import-show"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--dry-run"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--import"
);
if
(
!
err
&&
(
mode
&
GPGME_KEYLIST_MODE_SIGS
)
&&
have_gpg_version
(
gpg
,
"2.0.10"
))
err
=
add_arg
(
gpg
,
"--with-sig-check"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
data
,
-1
,
0
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_keysign
(
void
*
engine
,
gpgme_key_t
key
,
const
char
*
userid
,
unsigned
long
expire
,
unsigned
int
flags
,
gpgme_ctx_t
ctx
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
const
char
*
s
;
if
(
!
key
||
!
key
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_ARG
);
if
(
!
have_gpg_version
(
gpg
,
"2.1.12"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
((
flags
&
GPGME_KEYSIGN_LOCAL
))
err
=
add_arg
(
gpg
,
"--quick-lsign-key"
);
else
err
=
add_arg
(
gpg
,
"--quick-sign-key"
);
/* The force flag as only an effect with recent gpg versions; if the
* gpg version is too old, the signature will simply not be created.
* I think this is better than bailing out. */
if
(
!
err
&&
(
flags
&
GPGME_KEYSIGN_FORCE
)
&&
have_gpg_version
(
gpg
,
"2.2.28"
))
err
=
add_arg
(
gpg
,
"--force-sign-key"
);
if
(
!
err
)
err
=
append_args_from_signers
(
gpg
,
ctx
);
/* If an expiration time has been given use that. If none has been
* given the default from gpg.conf is used. To make sure not to set
* an expiration time at all the flag GPGME_KEYSIGN_NOEXPIRE can be
* used. */
if
(
!
err
&&
(
expire
||
(
flags
&
GPGME_KEYSIGN_NOEXPIRE
)))
{
char
tmpbuf
[
8
+
20
];
if
((
flags
&
GPGME_KEYSIGN_NOEXPIRE
))
expire
=
0
;
snprintf
(
tmpbuf
,
sizeof
tmpbuf
,
"seconds=%lu"
,
expire
);
err
=
add_arg
(
gpg
,
"--default-cert-expire"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
tmpbuf
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
fpr
);
if
(
!
err
&&
userid
)
{
if
((
flags
&
GPGME_KEYSIGN_LFSEP
))
{
for
(;
!
err
&&
(
s
=
strchr
(
userid
,
'\n'
));
userid
=
s
+
1
)
if
((
s
-
userid
))
err
=
add_arg_len
(
gpg
,
"="
,
userid
,
s
-
userid
);
if
(
!
err
&&
*
userid
)
err
=
add_arg_pfx
(
gpg
,
"="
,
userid
);
}
else
err
=
add_arg_pfx
(
gpg
,
"="
,
userid
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_revsig
(
void
*
engine
,
gpgme_key_t
key
,
gpgme_key_t
signing_key
,
const
char
*
userid
,
unsigned
int
flags
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
const
char
*
s
;
if
(
!
key
||
!
key
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_ARG
);
if
(
!
have_gpg_version
(
gpg
,
"2.2.24"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
err
=
add_arg
(
gpg
,
"--quick-revoke-sig"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
fpr
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
signing_key
->
fpr
);
if
(
!
err
&&
userid
)
{
if
((
flags
&
GPGME_REVSIG_LFSEP
))
{
for
(;
!
err
&&
(
s
=
strchr
(
userid
,
'\n'
));
userid
=
s
+
1
)
if
((
s
-
userid
))
err
=
add_arg_len
(
gpg
,
"="
,
userid
,
s
-
userid
);
if
(
!
err
&&
*
userid
)
err
=
add_arg_pfx
(
gpg
,
"="
,
userid
);
}
else
err
=
add_arg_pfx
(
gpg
,
"="
,
userid
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_tofu_policy
(
void
*
engine
,
gpgme_key_t
key
,
gpgme_tofu_policy_t
policy
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
const
char
*
policystr
=
NULL
;
if
(
!
key
||
!
key
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_ARG
);
switch
(
policy
)
{
case
GPGME_TOFU_POLICY_NONE
:
break
;
case
GPGME_TOFU_POLICY_AUTO
:
policystr
=
"auto"
;
break
;
case
GPGME_TOFU_POLICY_GOOD
:
policystr
=
"good"
;
break
;
case
GPGME_TOFU_POLICY_BAD
:
policystr
=
"bad"
;
break
;
case
GPGME_TOFU_POLICY_ASK
:
policystr
=
"ask"
;
break
;
case
GPGME_TOFU_POLICY_UNKNOWN
:
policystr
=
"unknown"
;
break
;
}
if
(
!
policystr
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
!
have_gpg_version
(
gpg
,
"2.1.10"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
err
=
add_arg
(
gpg
,
"--tofu-policy"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
policystr
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
fpr
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_sign
(
void
*
engine
,
gpgme_data_t
in
,
gpgme_data_t
out
,
gpgme_sig_mode_t
mode
,
int
use_armor
,
int
use_textmode
,
int
include_certs
,
gpgme_ctx_t
ctx
/* FIXME */
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
(
void
)
include_certs
;
gpg
->
flags
.
use_gpgtar
=
mode
==
GPGME_SIG_MODE_ARCHIVE
;
if
(
gpg
->
flags
.
use_gpgtar
&&
!
have_gpg_version
(
gpg
,
"2.3.5"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
if
(
mode
==
GPGME_SIG_MODE_CLEAR
)
err
=
add_arg
(
gpg
,
"--clearsign"
);
else
{
err
=
add_arg
(
gpg
,
"--sign"
);
if
(
!
err
&&
mode
==
GPGME_SIG_MODE_DETACH
)
err
=
add_arg
(
gpg
,
"--detach"
);
if
(
!
err
&&
use_armor
)
err
=
add_gpg_arg
(
gpg
,
"--armor"
);
if
(
!
err
)
{
if
(
gpgme_data_get_encoding
(
in
)
==
GPGME_DATA_ENCODING_MIME
&&
have_gpg_version
(
gpg
,
"2.1.14"
))
err
=
add_gpg_arg
(
gpg
,
"--mimemode"
);
else
if
(
use_textmode
)
err
=
add_gpg_arg
(
gpg
,
"--textmode"
);
}
}
if
(
!
err
&&
gpg
->
flags
.
include_key_block
)
err
=
add_gpg_arg
(
gpg
,
"--include-key-block"
);
if
(
!
err
)
err
=
append_args_from_signers
(
gpg
,
ctx
);
if
(
!
err
)
err
=
append_args_from_sender
(
gpg
,
ctx
);
if
(
!
err
)
err
=
append_args_from_sig_notations
(
gpg
,
ctx
,
NOTATION_FLAG_SIG
);
/* Tell the gpg object about the data. */
if
(
gpg
->
flags
.
use_gpgtar
)
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
in
);
if
(
!
err
&&
file_name
)
{
err
=
add_arg
(
gpg
,
"--directory"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
file_name
);
}
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--files-from"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--null"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--utf8-strings"
);
/* Pass the filenames to gpgtar's stdin. */
if
(
!
err
)
err
=
add_data
(
gpg
,
in
,
0
,
0
);
}
else
{
const
char
*
file_name
=
gpgme_data_get_file_name
(
in
);
if
(
!
err
&&
file_name
)
err
=
add_gpg_arg_with_value
(
gpg
,
"--set-filename="
,
file_name
,
0
);
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
in
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
in
,
-1
,
0
);
}
if
(
!
err
)
err
=
add_data
(
gpg
,
out
,
1
,
1
);
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
gpgme_error_t
gpg_verify
(
void
*
engine
,
gpgme_data_t
sig
,
gpgme_data_t
signed_text
,
gpgme_data_t
plaintext
,
gpgme_ctx_t
ctx
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
err
=
append_args_from_sender
(
gpg
,
ctx
);
if
(
!
err
&&
gpg
->
flags
.
auto_key_import
)
err
=
add_arg
(
gpg
,
"--auto-key-import"
);
if
(
!
err
&&
ctx
->
auto_key_retrieve
)
err
=
add_arg
(
gpg
,
"--auto-key-retrieve"
);
if
(
err
)
;
else
if
(
plaintext
)
{
/* Normal or cleartext signature. */
err
=
add_arg
(
gpg
,
"--output"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"-"
);
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
sig
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
sig
,
-1
,
0
);
if
(
!
err
)
err
=
add_data
(
gpg
,
plaintext
,
1
,
1
);
}
else
{
err
=
add_arg
(
gpg
,
"--verify"
);
if
(
!
err
)
err
=
add_input_size_hint
(
gpg
,
signed_text
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_data
(
gpg
,
sig
,
-1
,
0
);
if
(
!
err
&&
signed_text
)
err
=
add_data
(
gpg
,
signed_text
,
-1
,
0
);
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
static
void
gpg_set_io_cbs
(
void
*
engine
,
gpgme_io_cbs_t
io_cbs
)
{
engine_gpg_t
gpg
=
engine
;
gpg
->
io_cbs
=
*
io_cbs
;
}
static
gpgme_error_t
gpg_set_pinentry_mode
(
void
*
engine
,
gpgme_pinentry_mode_t
mode
)
{
engine_gpg_t
gpg
=
engine
;
gpg
->
pinentry_mode
=
mode
;
return
0
;
}
static
gpgme_error_t
gpg_getauditlog
(
void
*
engine
,
gpgme_data_t
output
,
unsigned
int
flags
)
{
engine_gpg_t
gpg
=
engine
;
#define MYBUFLEN 4096
char
buf
[
MYBUFLEN
];
int
nread
;
int
any_written
=
0
;
if
(
!
(
flags
&
GPGME_AUDITLOG_DIAG
))
{
return
gpg_error
(
GPG_ERR_NOT_IMPLEMENTED
);
}
if
(
!
gpg
||
!
output
)
{
return
gpg_error
(
GPG_ERR_INV_VALUE
);
}
if
(
!
gpg
->
diagnostics
)
{
return
gpg_error
(
GPG_ERR_GENERAL
);
}
gpgme_data_rewind
(
gpg
->
diagnostics
);
while
((
nread
=
gpgme_data_read
(
gpg
->
diagnostics
,
buf
,
MYBUFLEN
))
>
0
)
{
any_written
=
1
;
if
(
gpgme_data_write
(
output
,
buf
,
nread
)
==
-1
)
return
gpg_error_from_syserror
();
}
if
(
!
any_written
)
{
return
gpg_error
(
GPG_ERR_NO_DATA
);
}
if
(
nread
==
-1
)
return
gpg_error_from_syserror
();
gpgme_data_rewind
(
output
);
return
0
;
#undef MYBUFLEN
}
static
gpgme_error_t
gpg_setexpire
(
void
*
engine
,
gpgme_key_t
key
,
unsigned
long
expires
,
const
char
*
subfprs
,
unsigned
int
reserved
)
{
engine_gpg_t
gpg
=
engine
;
gpgme_error_t
err
;
const
char
*
s
;
if
(
reserved
)
return
gpg_error
(
GPG_ERR_INV_VALUE
);
if
(
!
key
||
!
key
->
fpr
)
return
gpg_error
(
GPG_ERR_INV_ARG
);
if
(
!
have_gpg_version
(
gpg
,
"2.1.22"
))
return
gpg_error
(
GPG_ERR_NOT_SUPPORTED
);
err
=
add_arg
(
gpg
,
"--quick-set-expire"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
"--"
);
if
(
!
err
)
err
=
add_arg
(
gpg
,
key
->
fpr
);
if
(
!
err
)
{
char
tmpbuf
[
8
+
20
];
snprintf
(
tmpbuf
,
sizeof
tmpbuf
,
"seconds=%lu"
,
expires
);
err
=
add_arg
(
gpg
,
tmpbuf
);
}
if
(
!
err
&&
subfprs
)
{
for
(;
!
err
&&
(
s
=
strchr
(
subfprs
,
'\n'
));
subfprs
=
s
+
1
)
{
if
((
s
-
subfprs
))
{
err
=
add_arg_len
(
gpg
,
NULL
,
subfprs
,
s
-
subfprs
);
}
}
if
(
!
err
&&
*
subfprs
)
{
err
=
add_arg
(
gpg
,
subfprs
);
}
}
if
(
!
err
)
err
=
start
(
gpg
);
return
err
;
}
struct
engine_ops
_gpgme_engine_ops_gpg
=
{
/* Static functions. */
_gpgme_get_default_gpg_name
,
NULL
,
gpg_get_version
,
gpg_get_req_version
,
gpg_new
,
/* Member functions. */
gpg_release
,
NULL
,
/* reset */
gpg_set_status_cb
,
gpg_set_status_handler
,
gpg_set_command_handler
,
gpg_set_colon_line_handler
,
gpg_set_locale
,
NULL
,
/* set_protocol */
gpg_set_engine_flags
,
/* set_engine_flags */
gpg_decrypt
,
gpg_delete
,
gpg_edit
,
gpg_encrypt
,
gpg_encrypt_sign
,
gpg_export
,
gpg_export_ext
,
gpg_genkey
,
gpg_import
,
gpg_keylist
,
gpg_keylist_ext
,
gpg_keylist_data
,
gpg_keysign
,
gpg_revsig
,
gpg_tofu_policy
,
/* tofu_policy */
gpg_sign
,
gpg_verify
,
gpg_getauditlog
,
gpg_setexpire
,
NULL
,
/* opassuan_transact */
NULL
,
/* conf_load */
NULL
,
/* conf_save */
NULL
,
/* conf_dir */
NULL
,
/* query_swdb */
gpg_set_io_cbs
,
gpg_io_event
,
gpg_cancel
,
NULL
,
/* cancel_op */
gpg_passwd
,
gpg_set_pinentry_mode
,
NULL
/* opspawn */
};
File Metadata
Details
Attached
Mime Type
text/x-c
Expires
Mon, Dec 23, 3:31 PM (1 d, 6 h)
Storage Engine
local-disk
Storage Format
Raw Data
Storage Handle
28/b9/ac18070f0c698cc2d27c315504df
Attached To
rM GPGME
Event Timeline
Log In to Comment